Qualifier Test PDF

Summary

This document contains a series of multiple-choice questions testing computer security knowledge. The questions cover topics like malware removal, Linux commands, DNS settings, and security practices. The answers and feedback are also included.

Full Transcript

0 / 1 point Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop? Pro , Not Selected Enterprise , Not Selected Incorrect answer: Home **[Pro for workstations]** , Not Selected ### **Results for question 2.** 2 1 / 1 poin...

0 / 1 point Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop? Pro , Not Selected Enterprise , Not Selected Incorrect answer: Home **[Pro for workstations]** , Not Selected ### **Results for question 2.** 2 1 / 1 point A user has a computer that suddenly started running very sluggishly. Upon inquiry, you find that they wen to some websites yesterday that they don\'t normally visit, so you decide to follow the best practice procedures for malware removal. What is the first step? Correct answer: **[Investigate and verify malware symptoms.]** Disable System Restore in Windows. , Not Selected Quarantine infected systems. , Not Selected Schedule scans and run updates. , Not Selected ### **Feedback** #### **Based on answering correctly** The seven steps of the malware removal process are as follows: Investigate and verify malware symptoms. Quarantine infected systems. Disable System Restore in Windows. Remediate infected systems. Update anti-malware software. Scanning and removal techniques (e.g., safe mode, preinstallation environment). Schedule scans and run updates. Enable System Restore and create a restore point in Windows. Educate the end user. ### **Results for question 3.** 3 1 / 1 point You are logged into a Linux workstation with a regular user account. You need to execute a command with root permissions. Which command do you need to use? man , Not Selected Correct answer: **[sudo]** grep , Not Selected su , Not Selected ### **Results for question 4.** 4 1 / 1 point Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications? Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed , Not Selected Install and run Linux and the required application in a PaaS cloud environment , Not Selected Set up a dual boot system by selecting the option to install Linux alongside Windows , Not Selected Correct answer: **[Install and run Linux and the required application as a virtual machine installed under the Windows OS]** ### **Results for question 5.** 5 1 / 1 point A user calls the help desk because they are not able to access the Internet. After asking a few questions, you discover that if they type in IP address in the browser, then the website pops up. Other users on the same switch aren\'t having this problem. Where will you start looking for the problem? Web Server , Not Selected File server , Not Selected **[Correct answer:]** **[DNS Settings]** DHCP Settings , Not Selected ### **Feedback** #### **Based on answering correctly** If you can reach a website using an IP address, then the problem has something to do with DNS settings. The default DNS server can be configured using DHCP settings, but since the other users aren\'t having this problem, it\'s not a setting on the DHCP server. That means it must be configured on the local computer. The user is able to reach the file server, and if they\'re accessing a remote website the problem wouldn\'t be your company\'s web server. ### **Results for question 6.** 6 1 / 1 point Your client has computers using macOS and other computers that are Windows-based. They want to have a shared drive configured so that both operating systems can access it. The files are very large, some of them exceeding 4 GB. What filesystem should you use to format the shared drive? ext4 , Not Selected **[Correct answer:]** **[exFAT]** NTFS , Not Selected FAT32 , Not Selected ### **Feedback** #### **Based on answering correctly** FAT32 and exFAT are both compatible with both Windows and macOS systems, but the exFAT filesystem supports files greater than 4 GB; FAT32 does not. NTFS is only compatible with Windows, ext4 is used in Linux/Unix systems, and Apple File System (APFS) is the filesystem for macOS 10.13 and later. ### **Results for question 7.** 7 1 / 1 point A user calls and complains that they can\'t see any printers when they try to print a document from their Windows computer. They say that they had three network printers showing yesterday, and they can access the server across the network. What will you do first? Reinstall Windows , Not Selected Reinstall the network printers , Not Selected Correct answer: **[Check the status of the Print Spooler service.]** Repair Windows , Not Selected ### **Feedback** #### **Based on answering correctly** B. Check the simple things first. If the Print Spooler service isn\'t running, then printers will not show. It\'s unlikely that you would need to reinstall or repair Windows. ### **Results for question 8.** 8 1 / 1 point Your company works with confidential government files. It is illegal for employees to copy any files to flash drives. Where do you specify this as well as the penalties for not complying with the rule? APK , Not Selected ADF , Not Selected **[Correct answer:]** **[AUP]** ACL , Not Selected ### **Results for question 9.** 9 1 / 1 point When you want to identify the chipset of a motherboard, where should you look? On the Power Supply , Not Selected On the motherboard , Not Selected On the CPU , Not Selected Correct answer: I**[n the manufacturers documentation]** ### **Results for question 10.** 10 0 / 1 point A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO) **[Answer,]** **[Install a new hard drive and clone the user\'s drive to it]** **[Correct answer:]** **[Scan the computer with the company-provided antivirus software]** Answer, Uninstall the company-provided antivirus software Answer, Deploy an ad-blocking extension to the browser. Incorrect answer: Perform a reset on the user\'s web browser Selected Answer - Incorrect Answer, Click the link in the messages to pay for virus removal ### **Results for question 11.** 11 1 / 1 point Occasionally when visiting websites using Google Chrome, you receive a pop-up window in front of your browser. Generally, it\'s an advertisement trying to sell you something. Which of the following actions will stop this from happening? Correct answer: **[Enable Chrome\'s pop-up blocker]**. Install anti-malware software to stop the adware. , Not Selected Enable Windows Firewall. , Not Selected Install an antivirus program. , Not Selected ### **Results for question 12.** 12 1 / 1 point You\'re in the middle of a major IT systems change and have gotten to a point where you realize that it\'s not going to work without shutting down everything for a week. This would cost the company a fortune and will put production way behind. What will you do? Follow the AUP. , Not Selected **[Correct answer:]** **[Follow the rollback plan.]** Fire the responsible staff member. , Not Selected Let the management know and continue with the project. , Not Selected ### **Feedback** #### **Based on answering correctly** A case like this is exactly why you have a rollback plan. Occasionally, despite your best efforts, you get into a project and discover that it isn\'t going to work, or it will take longer than expected. Perhaps if you rework the plan you could make the changes without a big disruption to the business. Involving management in what is going on is always a good idea. The acceptable use policy (AUP) likely doesn\'t have any bearing here. ### **Results for question 13.** 13 1 / 1 point A Windows computer user reports that their computer just completely locked up. On the screen is a message saying that the person pictured has participated in an illegal activity. The webcam turned on by itself, and the computer user was pictured. The message also says they can resolve the charges against them by paying a \$500 fine. They are understandably shaken by the incident. What should you do next? Delete and reinstall Windows. , Not Selected Correct answer: **[Boot to a bootable media from your anti-malware provider and run a remediation.]** Tell the user that if they performed an illegal activity with their work computer, their employment will be terminated. , Not Selected Pay the fine , Not Selected ### **Results for question 14.** 14 1 / 1 point A technician is troubleshooting a customer\'s PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician\'s actions? Set & Meet deadlines , Not Selected Adhere to users privacy policy , Not Selected **[Correct answer:]** **[Avoid distractions]** Deal appropriately with customers confidential material , Not Selected ### **Results for question 15.** 15 1 / 1 point Which of the following is an advantage of using share permissions over using NTFS permissions? **[Correct answer:]** **[Share permissions can be enabled to secure resources across the network that are not on an NTFS partition.]** Share permissions will override NTFS permissions if there is a conflict. , Not Selected Share permissions are able to be set at the file level, whereas NTFS permissions can be set only at the folder level. , Not Selected Share permissions apply when users access a resource across the network, but NTFS permissions apply only to local users. , Not Selected ### **Feedback** #### **Based on answering correctly** B.The one big advantage of share permissions is that they can be used if the NTFS filesystem is not in place. Of course, share permissions are in effect only when the user connects to the resource via the network. NTFS permissions are able to protect at the file level. Share permissions can be applied to the folder level only. NTFS permissions can affect users logged on locally or across the network to the system where the NTFS permissions are applied. ### **Results for question 16.** 16 1 / 1 point You are training mobile users on potential security risks. Which of the following could make users more susceptible to an on-path attack? **[Correct answer:]** **[Unintended Wi-Fi connection]** Unauthorized camera activation , Not Selected Unauthorized location tracking , Not Selected Unauthorized account access , Not Selected ### **Results for question 17.** 17 1 / 1 point You\'re at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren\'t moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you\'ve been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action? Unhook the network cable. , Not Selected Close the lid on the laptop. , Not Selected Turn the laptop\'s power off. , Not Selected **[Correct answer:]** **[Turn on Airplane mode.]** ### **Feedback** #### **Based on answering correctly** A. The quickest way to thwart this would-be attacker is to turn on Airplane mode. This disconnects all of your wireless connections and is usually done by pressing a key or two, such as the Fn key and whichever F key has a picture of an airplane on it. There is no network cable to disconnect if you are on Wi-Fi, and what closing the lid does depends on how the computer is configured. It may do nothing. If you turn the laptop\'s power off, you will lose whatever you have been working on. ### **Results for question 18.** 18 1 / 1 point Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident? Spoofing , Not Selected Scareware , Not Selected Pretexting , Not Selected **[Correct answer:]** **[Vishing]** ### **Results for question 19.** 19 1 / 1 point You are planning on formatting a hard drive with NTFS that will be used to share files between Windows 10 and Windows 11 Pro computers. Which of the following features are present in NTFS? (Choose two.) **[Correct answer:]** **[File and folder encryption]** **[Correct answer:]** **[File compression]** Answer, Enhanced flash drive support Answer, Linux OS support ### **Results for question 20.** 20 1 / 1 point Computer users are often reluctant to have anything change, so gaining their acceptance prior to the change will make a transition run more smoothly. What are two ways that you can gain end-user acceptance to a change? (Choose two.) **[Correct answer:]** **[Thoroughly explain why this change is necessary.]** **[Correct answer:]** **[Involve them in the planning process.]** Answer, Make them fill out request forms. Answer, Don\'t tell them and just have the change done when they come in on a Monday. ### **Feedback** #### **Based on answering correctly** No one likes to have changes forced on them, but in IT there are changes every day. When you have a major change, your headaches will be less if you can gain end-user acceptance before the change happens. Two of the best ways to do this are to involve them in the parts of the planning process that affect them, such as user input screens. Have a meeting and listen to input from the people who will actually be using the system. They may have some insight that you don\'t. Also be sure to thoroughly explain why the change is necessary. The worst thing to do is spring the change on them by not telling them about it and having them discover it when they log in Monday morning. ### **Results for question 21.** 21 1 / 1 point A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need? administrator account , Not Selected guest account , Not Selected standard account , Not Selected **[Correct answer:]** **[power user account]** ### **Feedback** #### **General Feedback** - - - So, the **Power User Account** strikes the balance by giving necessary permissions while aligning with the least privilege policy. ### **Results for question 22.** 22 1 / 1 point A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage? Completed an inventory of tools before use , Not Selected Practiced electrical fire safety , Not Selected **[Correct answer:]** **[Connected a proper ESD strap]** Removed all jewelry , Not Selected ### **Results for question 23.** 23 0 / 1 point You have installed a second hard drive in a Windows workstation. In Disk Management, what type of partition can you create that will allow you to create an unlimited number of logical partitions in it? Incorrect answer: Dynamic Extended , Not Selected Logical , Not Selected **[GPT]** , Not Selected ### **Feedback** #### **Based on answering incorrectly** When you create a partition in Windows 10, it will ask if you want to create a master boot record (MBR) or GUID Partition Table (GPT) partition. GPT is newer and has far more features. One of those features is that you can create an unlimited number of logical partitions on it. Only the operating system will limit you; Windows 10 will only allow 128 partitions on one drive. Windows 11 supports only the GPT partition type. ### **Results for question 24.** 24 0 / 1 point You have a situation that requires installing Windows 11 from installation media. You\'ll be launching Setup on the media while you are on the existing Windows 10 desktop. Which of the following is not an option? Incorrect answer: Full upgrade Clean install , Not Selected **[Forensic install]** , Not Selected Keep data only , Not Selected ### **Results for question 25.** 25 0 / 1 point A user needs to travel for a presentation and wants to be sure their laptop does not run off battery power, so they want to turn it off. However, they want to leave their files and applications running, so that when they turn it back on, the applications are already open. Which of the following statements is true? The user will be unable to do this. , Not Selected **[The user should have their computer hibernate.]** , Not Selected The user should put their computer into standby mode. , Not Selected Incorrect answer: The user needs to activate the sleep power plan. ### **Results for question 26.** 26 1 / 1 point When your friend launches their new favorite game, they often get low memory warnings. Which two of the following can you do to prevent this problem from happening in the future? (Choose two.) **[Correct answer:]** **[Increase virtual memory.]** **[Correct answer:]** **[Increase physical memory.]** Answer, Put in a faster NIC Answer, Use Task Manager to end unnecessary programs. ### **Results for question 27.** 27 1 / 1 point A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference? Disabling the SSID broadcast , Not Selected Modifying the wireless security , Not Selected Changing the AP name , Not Selected **[Correct answer:]** **[Changing channels]** ### **Results for question 28.** 28 1 / 1 point A user has a 32-bit application that they want to use on a 64-bit operating system and they have asked you if that will work. What do you tell them? No, the application must be 64-bit to run on a 64-bit operating system. , Not Selected **[Correct answer:]** **[Yes, a 32-bit application will work on a 64-bit operating system.]** 32-bit and 64-bit are interchangeable. , Not Selected A 64-bit application will run on a 32-bit operating system, but a 32-bit application will not run on a 64-bit operating system. , Not Selected ### **Feedback** #### **Based on answering correctly** A 64-bit operating system will support both 32-bit and 64-bit applications. A 32-bit application will work on a 64-bit operating system, but it won\'t take advantage of the 64-bit speed. It will essentially run half as fast as a 64-bit application would. 32-bit operating systems only support 32-bit programs; you can\'t run a 64-bit application on a 32-bit operating system. Luckily, there aren\'t many computers with 32-bit operating systems around anymore. ### **Results for question 29.** 29 1 / 1 point A small business has two servers in their telecommunications room. They\'ve come seeking your advice because the area has frequent power outages and they have lost important data on their servers as a result. What will you recommend for them to protect against this issue? Surge suppressor , Not Selected Power strip , Not Selected Line conditioner , Not Selected **[Correct answer:]** **[Battery backup]** ### **Results for question 30.** 30 0 / 1 point A small office\'s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.\ \ Which of the following configurations MOST likely allowed the attack to take place? (Choose two.) Answer, Outdated firmware Incorrect answer: WEP Selected Answer - Incorrect Answer, **[WPS]** Answer, Guest network Answer, TKIP Correct answer: **[Default Login]** ### **Results for question 31.** 31 1 / 1 point A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? **[Correct answer:]** **[Name server]** Host address , Not Selected Default gateway , Not Selected Subnet mask , Not Selected ### **Results for question 32.** 32 0 / 1 point A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange: What does the user need? Incorrect answer: Passwords Root CA **[, Not Selected]** **[Keys]** , Not Selected Tokens , Not Selected ### **Results for question 33.** 33 1 / 1 point Which feature of Windows Pro or higher editions is designed to encrypt storage volumes, must be activated by an administrator, and can encrypt operating system startup files? EFS , Not Selected ShadowDrive , Not Selected OneDrive , Not Selected **[Correct answer:]** **[BitLocker]** ### **Results for question 34.** 34 0 / 1 point When configuring NTFS permissions on a Windows workstation, what is the recommended method? **[Put user accounts into groups. Grant permissions to groups.]** , Not Selected Put user accounts into groups. Grant folder permissions to users and file permissions to groups. , Not Selected Incorrect answer: Put user accounts into groups. Grant folder permissions to groups and file permissions to users. Grant permissions to user accounts. , Not Selected ### **Feedback** #### **Based on answering incorrectly** The recommended way to assign permissions on Microsoft systems is to grant them to groups. Then, users can be assigned to groups depending on their access needs. This is far less work than managing permissions on a user-by-user basis. ### ### ### ### ### ### ### **Results for question 35.** 35 0 / 1 point You want to protect mobile device users on your network from potentially leaked files or data. Which of the following should you do to help reduce this risk? (Choose two.) Answer, Enforce data transmission over limits. Incorrect answer: Install mobile firewalls. Selected Answer - Incorrect Answer, **[Disable network autoconnect.]** Correct answer: **[Enable device encryption.]** ### **Feedback** #### **Based on answering incorrectly** When authorized users access devices through unintended connections or unauthorized users access stolen devices, they can access the data on the device. Disable autoconnect to avoid unintended connections and encrypt data on devices to help protect the data on them in the event they are stolen. ### **Results for question 36.** 36 1 / 1 point You are on-site fixing a client\'s laptop that will not load the OS. You are waiting to hear about your friend\'s awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You\'re sure that all your friends are texting information about the party. What should you do? (Choose two.) **[Correct answer:]** **[Ignore your phone.]** Answer, Text your friends back and tell them that you are working. Answer, Call your friend and tell them to wait until after this job before planning all the details because you want to help. Correct answer: **[Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won\'t be a problem now.]** ### **Results for question 37.** 37 1 / 1 point A user who is less comfortable with technology is having to navigate through File Explorer to a network shared resource several times a day. The user asks if there is an easier way. What will you configure for this user? Gateway , Not Selected Subnet Mask , Not Selected Domain Name , Not Selected Correct answer: **[Mapped Drive]** ### **Feedback** #### **Based on answering correctly** Mapping a network drive for this user will make navigating to the resource much easier. A domain name identifies a Windows Active Directory domain. A subnet mask is used in IPv4 networking, and a gateway is the proxy server, router, or other device that connects a user to other networks, including the Internet. ### **Results for question 38.** 38 1 / 1 point An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software\'s cloud server. Which of the following is MOST likely to be of concern to the IT manager? **[Correct answer:]** **[Network utilization will be significantly increased due to the size of CAD files]** All updated software must be tested with alt system types and accessories , Not Selected Large update and installation files will overload the local hard drives. , Not Selected Extra technician hours must be budgeted during installation of updates , Not Selected ### **Results for question 39.** 39 1 / 1 point A user reports that their profile is very slow to load, then they get an error message that says, \"unable to load profile.\" What should you suspect? The user logged on using the wrong password. , Not Selected The profile is too large. , Not Selected **[Correct answer:]** **[The profile is corrupted.]** They need to reboot and try again. , Not Selected ### **Feedback** #### **Based on answering correctly** If a user profile is very large, it may be slow to load but it should eventually get there. If there is an error message that it is unable to load, suspect a corrupted profile. To verify that\'s the problem, create a new user and copy the existing user profile to the new user, then try to log on as the new user. If the same error occurs, the profile is corrupted. You\'ll need to delete the corrupted profile and when the user logs on again, a new profile will be created. ### **Results for question 40.** 40 1 / 1 point After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature? Update the AUP , Not Selected Create a network login script , Not Selected **[Correct answer:]** **[Push a group policy]** Assign a local security policy , Not Selected ### ### ### ### ### **Results for question 41.** 41 1 / 1 point You are instructing a new Mac user on the features of macOS. They ask if the system is capable of storing their passwords to various Internet sites. Which feature would they use for that? **[Correct answer:]** **[Keychain]** FileVault , Not Selected Mission Control , Not Selected Terminal , Not Selected ### **Results for question 42.** 42 1 / 1 point A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? Internet Options - Advanced , Not Selected Internet Options - Content , Not Selected Correct answer: **[Internet Options - Connections]** Internet Options - Privacy , Not Selected ### **Results for question 43.** 43 1 / 1 point An Android phone user reports that their phone can\'t connect to the Wi-Fi network, but they have a cellular signal. What is the first thing to have them try? Adjust the Wi-Fi signal receptivity. , Not Selected Correct answer: **[Check whether the Wi-Fi is enabled.]** Check whether the phone is in Airplane mode. , Not Selected Reset to factory defaults. , Not Selected ### **Results for question 44.** 44 1 / 1 point You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content? Online content is protected through terms established by Microsoft. , Not Selected Online content can not be protected through the use of DRM. , Not Selected Online content is considered open source; therefore, you may use whatever you find. , Not Selected **[Correct answer:]** **[Online content can be protected through the use of DRM.]** ### **Results for question 45.** 45 1 / 1 point You are writing a script in Microsoft PowerShell to automate some processes that you perform daily. What file extension will the script file have?.bat , Not Selected **[Correct answer:]** **[.ps1]**.py , Not Selected.vbs , Not Selected ### **Results for question 46.** 46 0 / 1 point A management directive requires that you keep hard copies of all your workstations\' system configurations. You have all Windows workstations. Which command can you use to easily gather this information for remote workstations and save a report as a text file? mmc , Not Selected Incorrect answer: compmgmt perfmon , Not Selected **[msinfo32]** , Not Selected ### **Results for question 47.** 47 1 / 1 point A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company\'s compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow? Require files to be individually password protected with unique passwords , Not Selected Configure a hardened SFTP portal for file transfers between file servers , Not Selected Deploy a secondary hard drive with encryption on the appropriate workstation , Not Selected **[Correct answer:]** **[Enable BitLocker To Go with a password that meets corporate requirements]** ### **Results for question 48.** 48 0 / 1 point A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft? **[Disk encryption]** , Not Selected USB drive encryption , Not Selected File encryption , Not Selected Incorrect answer: Data in transit encryption ### **Results for question 49.** 49 1 / 1 point change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process? communicate to stakeholders , Not Selected sandbox testing , Not Selected perform risk analysis , Not Selected **[Correct answer:]** **[end user acceptance]** ### **Results for question 50.** 50 1 / 1 point Which of the following uses a remote access server to forward a user\'s logon password to an authentication server, allowing or denying access to a system? TKIP , Not Selected **[Correct answer:]** **[TACACS]** WPA2-PSK , Not Selected AES , Not Selected ### **Results for question 51.** 51 1 / 1 point You\'re installing a new video card in a computer. It was an expensive card and you want to ensure that it isn\'t damaged by ESD. Until you are ready to place the card in the slot, what is the safest place for the card? Lying on the antistatic bag , Not Selected Lying on the antistatic mat , Not Selected Lying on the edge of the computer so that it\'s grounded , Not Selected **[Correct answer:]** **[Inside its antistatic bag]** ### ### ### ### ### **Results for question 52.** 52 1 / 1 point You\'re trying to share pictures with your friends. You both have iPhones, but your AirDrop doesn\'t seem to be working. Which of the following might solve the problem? (Choose two.) Answer, Turn on both hotspots **[Correct answer:]** **[Turn Bluetooth on]** **[Correct answer:]** **[Ensure both devices are discoverable]** Answer, Turn airplane mode on ### **Results for question 53.** 53 1 / 1 point Your company does a full backup every Sunday and incremental backups all the other days of the week at the end of the day. If you come in on Wednesday morning and your system has crashed, what backups will need to be restored so that your system will be fully recovered? **[Correct answer:]** **[Sunday Monday and Tuesday]** Sunday and Tuesday , Not Selected Sunday & Monday , Not Selected Sunday only , Not Selected ### **Feedback** #### **Based on answering correctly** Incremental backups will only back up what has changed since the last full backup or the last incremental backup. An incremental or full backup resets the archive bit, so only Monday\'s changes will be backed up on Monday, only Tuesday\'s changed files will be backed up on Tuesday, and only Wednesday\'s changed files will be backed up on Wednesday. You will need to restore all three backups to get all the changes that occurred since Sunday. ### ### ### ### **Results for question 54.** 54 1 / 1 point A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor\'s website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue? Disable the mobile hotspot. , Not Selected Increase the data plan limits , Not Selected **[Correct answer:]** **[Uninstall the fraudulent application]** Reset the phone to factory settings , Not Selected ### **Results for question 55.** 55 0 / 1 point You\'re on your smartphone and notice that the apps are all responding slowly, almost jittery when you change from one to the other. What is the first thing to do? Suspect a virus , Not Selected **[Check the storage on the device]** , Not Selected Incorrect answer: Close some running apps Check the battery charge , Not Selected ### **Feedback** #### **Based on answering incorrectly** If a battery is very low, the applications can show a slower than normal response time. If this continues when the phone is charged, see how full your phone is. If it\'s slow when you\'re saving or reading files, then you may need to clear out some space on the phone. Make sure your phone is updated. If it\'s an Android phone, ensure that your anti-malware is updated. If the problem is happening with just one app, try updating the app, clearing the app\'s cache, or removing and reinstalling the app. ### **Results for question 56.** 56 0 / 1 point An application on your mobile device has crashed and is unresponsive. What should be your first choice to fix it? Restart the device , Not Selected **[Force close the application]** , Not Selected Incorrect answer: Reinstall the application Revert to factory defaults , Not Selected ### **Feedback** #### **Based on answering incorrectly** The first step for any unresponsive app on your mobile device is to force-close it. How that is done will be different depending on whether it is an Apple or an Android device. If the app is still causing problems, you can try restarting your device, and if that doesn\'t work, uninstall and reinstall the application. Reverting your mobile device to factory defaults shouldn\'t be necessary. ### **Results for question 57.** 57 1 / 1 point A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting? **[Correct answer:]** **[Check for any installed patches and roll them back one at a time until the issue is resolved]** Run both CPU and memory tests to ensure that all hardware functionality is normal , Not Selected Install alternate open-source software in place of the applications with issues , Not Selected Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications. , Not Selected ### **Results for question 58.** 58 1 / 1 point You\'re working at your desktop computer, viewing a web page you use often, when a website that you know should be updating doesn\'t seem to be. In fact, if you access it from a different device, the website looks different. What can you do to force the website to update on your computer? (Choose two.) Answer, Uninstall and reinstall your browser. **[Correct answer:]** **[Clear the browser\'s cache.]** **[Correct answer:]** **[Clear the browser\'s stored cookies.]** Answer, Hold the Ctrl Key and F key simultaneously while on the website. ### **Feedback** #### **Based on answering correctly** Websites store parts of pages in the cache to make loading them faster the next time. If you clear the browser\'s cache and cookies, then when you access the website, it must download all of the data that was previously cached which means that it will be the updated version. It may take a little longer, but it will be up-to-date. If it\'s a site where you use cached credentials to log in, you must log in again. Uninstalling and reinstalling your browser isn\'t necessary. The Ctrl key and F key pressed simultaneously usually bring up a Find dialog box. ### **Results for question 59.** 59 1 / 1 point Your company makes a full backup every Sunday. Monday through Friday they create differential backups. They keep the weekly backup for a month, the daily backups are overwritten each week, and they make a backup once a month that is kept for a year. What is this backup scheme called? On-Site / Off-Site , Not Selected Synthetic , Not Selected **[Correct answer:]** **[Grandfather Father Son]** 3-2-1 Backup rule , Not Selected ### **Feedback** #### **Based on answering correctly** The grandfather-father-son (GFS) method of backing up, as described in the question, ensures that there are short-term, medium-term, and long-term backups of a system. You should have backups both on-site and off-site. The 3-2-1 backup rule says you should have three copies of data, using two different types of media, and one should be off-site. A synthetic backup is a full backup created by combining a recent full backup and the changes since then to create new files. It can be done outside the system, so there is no downtime and it\'s faster than doing a full backup. ### **Results for question 60.** 60 1 / 1 point You have a Windows Pro workstation installed in a workgroup. There is no centralized security. Which tool should you use to help protect yourself against malicious network attacks? **[Correct answer:]** **[Windows Defender Firewall]** Local Security Policy , Not Selected Computer Management , Not Selected NTFS Permissions , Not Selected ### **Feedback** #### **Based on answering correctly** Windows 10 and 11 both incorporate Windows Defender Firewall with Advanced Security, which can be used to stop incoming and outgoing network traffic. Traffic is allowed or denied by specific rules that are part of an access control list (ACL). By default, Windows Defender Firewall blocks incoming traffic. By creating exceptions, you can configure what incoming traffic you want to allow through. NTFS permissions are used to configure user access to files, folders, and volumes. Local Security Policy is used to configure items such as password policy and account lockout policies. Computer Management is a Microsoft Management Console with several frequently used tools. ### **Results for question 61.** 61 1 / 1 point What type of repair tool was introduced with Windows 7 as a way to restore from a full hard-drive snapshot? task manager , Not Selected safe mode , Not Selected **[Correct answer:]** **[system image recovery]** reset this pc , Not Selected ### **Results for question 62.** 62 1 / 1 point Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key. Which of the following is MOST likely the cause? **[Correct answer:]** **[Ransomware]** Rootkit , Not Selected Cryptomining , Not Selected Keylogger , Not Selected ### **Results for question 63.** 63 0 / 1 point One of the users you are responsible for called the help desk because when they turned the computer on this morning, instead of booting into Windows, it showed a green screen with 1s and 0s running down it. What will you do? Incorrect answer: Boot into safe mode and restore from a recent restore point. Turn the computer off and boot using boot media from your antivirus company. , Not Selected Go into WinRE and perform a clean installation of the operating system. , Not Selected **[Go into WinRE and repair the operating system installation.]** , Not Selected ### **Feedback** #### **Based on answering incorrectly** The computer is running a virus program before the operating system even boots, which indicates that there is a boot sector virus. The best way to remove this malware is using boot media from your antivirus company to clean the computer. You may need to go into the BIOS/UEFI settings and change the boot order to boot to the anti-malware media. You wouldn\'t need to repair or replace the operating system yet, although as part of the remediation you may need to. It is unlikely with this scenario that you would be able to boot into safe mode, and even if you did, the malware could be lurking in the restore point. Part of the best practice procedures for malware removal is to disable System Restore in Windows. ### **Results for question 64.** 64 1 / 1 point Which of the following should be enacted to reduce a company\'s liability and exposure to a potential lawsuit? Password compliance policy , Not Selected Incident documentation policy , Not Selected **[Correct answer:]** **[Acceptable use policy]** Change control policy , Not Selected ### **Results for question 65.** 65 1 / 1 point You are required to enter a username, password, and a code from an authenticator app on your phone before you can access the company website. What type of authentication is this? Single Sign on , Not Selected Multi Sign on , Not Selected Domain , Not Selected **[Correct answer:]** **[Multifactor]** ### **Feedback** #### **Based on answering correctly** This is a classic example of multifactor authentication. The username identifies you; the password (something you know) and the authenticator app code (something you have) are multiple ways to prove (authenticate) who you are. The four types of authentication are something you know, something you have, something you are (biometrics), and some place you are. ### **Results for question 66.** 66 1 / 1 point A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine? **[Correct answer:]** **[ifconfig or ip -a]** **[sudo]** , Not Selected chmod , Not Selected grep , Not Selected ### **Results for question 67.** 67 1 / 1 point You are going to move a desktop computer from one office location to another. It\'s on the floor, underneath the desk. Which of the following are good personal safety procedures to follow? (Choose two.) Answer, Bend at the waist and lift straight up. Answer, Leave the computer plugged in to avoid ESD. **[Correct answer:]** **[Tie back any loose jewelry, long hair, or neckties.]** **[Correct answer:]** **[Bend at the knees and lift with your legs.]** ### **Results for question 68.** 68 1 / 1 point A technician at a customer site is troubleshooting a laptop. A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform? Update Group Policy , Not Selected Verity the software license is current. , Not Selected **[Correct answer:]** **[Add the site to the client's exceptions list]** Change the DNS address to 1.1.1.1 , Not Selected ### **Results for question 69.** 69 1 / 1 point Which of the following is not done/created before the change board approves a change? Sandbox Testing , Not Selected Risk Analysis , Not Selected Rollback plan , Not Selected **[Correct answer:]** **[Kickoff Meeting]** ### **Results for question 70.** 70 0 / 1 point When a user calls in to report an issue, a technician submits a ticket on the user\'s behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? Have the user provide a callback phone number to be added to the ticket , Not Selected Incorrect answer: Register the ticket with a unique user identifier Assign the ticket to the department\'s power user , Not Selected **[Provide the user with a unique ticket number that can be referenced on subsequent calls.]** **[, Not Selected]** ### **Results for question 71.** 71 1 / 1 point A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use? **[Correct answer:]** **[.app]**.exe , Not Selected.vbs , Not Selected.deb , Not Selected ### **Results for question 72.** 72 1 / 1 point Which command can be used to show the \"hops,\" or routes, that are being traversed between the local computer and the destination computer? ping , Not Selected **[Correct answer:]** **[tracert]** ipconfig , Not Selected nbtstat , Not Selected ### **Feedback** #### **Based on answering correctly** The \"tracert\" command shows the path taken across networks from a given source to a given destination. The \"tracert: command is useful to identify networking and connectivity issues. It will provide the time between the hops on the network and any relevant IP or hostnames if they are available. The \"nbtstat\" command displays NetBIOS over TCP/IP information. The \"ping\" command tests if a remote destination is reachable. The \"ipconfig\" command configures a network interface. ### **Results for question 73.** 73 1 / 1 point You have some older drives that you intend to donate to a nonprofit organization. You want to set all data on the drive to be nothing but 0s. What should you use to accomplish this? format Command , Not Selected Degaussing , Not Selected Incinerating , Not Selected **[Correct answer:]** **[Drive wiping software]** ### ### ### **Results for question 74.** 74 0 / 1 point A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern.\ \ Which of the following backup methods would BEST address these concerns? **[Differential]** **[, Not Selected]** Incorrect answer: Off-site Grandfather Father Son , Not Selected Full , Not Selected ### **Results for question 75.** 75 1 / 1 point As the network administrator, you have set account lockout policies so that an account is locked out after five unsuccessful login attempts. What type of security threat will this deter? Zero day attack , Not Selected Shoulder Surfing , Not Selected **[Correct answer:]** **[Brute force attack]** Spear Phishing , Not Selected ### ### ### ### ### ### **Results for question 76.** 76 1 / 1 point A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task? consoltf , Not Selected FileVault , Not Selected time machine , Not Selected **[Correct answer:]** **[disk utility]** ### **Results for question 77.** 77 0 / 1 point A technician arrives on site to find that two users who have the same model of Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? Update the OS of the smartphones **[, Not Selected]** **[Clear the application cache]** , Not Selected Incorrect answer: Roll back the application to the earlier version Reinstall the application , Not Selected ### ### ### ### ### ### **Results for question 78.** 78 1 / 1 point Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate the settings he intends to change, but the online vendor documentation has instructions for configuring those settings. Which of the following should the technician perform? Configure content filtering , Not Selected Disable the SSID broadcast , Not Selected Change the firewall settings , Not Selected **[Correct answer:]** **[Check for a firmware update]** ### **Results for question 79.** 79 1 / 1 point Whenever you log into a computer at work, a screen with the company\'s name and some text appears. You must click OK before you can access the company network. What is a common purpose of a company\'s custom splash screen? Advertising their products , Not Selected Tracking employee time , Not Selected **[Correct answer:]** **[Confirming agreement to an AUP]** Announce upcoming events , Not Selected ### **Feedback** #### **Based on answering correctly** An acceptable use policy (AUP) describes what users are and are not allowed to do on the company\'s network. Often companies will use a splash screen to confirm that the employee has read and agrees to the AUP or other company policies before they can use the network. In different environments such as a kiosk or app, a splash screen can display while the program is loading, and in those situations, it may be used to reinforce a brand or advertise products. There are ways to track employee time on the network, but that\'s not the job of the splash screen. ### ### ### **Results for question 80.** 80 0 / 1 point You are troubleshooting a malware problem with a Windows 11 computer and find that you need to boot into safe mode\\safe boot, which loads with minimal drivers. Which management tool can you use to force the system to boot into safe mode when it reboots? Task scheduler , Not Selected Incorrect answer: Computer Management Task Manager , Not Selected **[System Configuration]** **[, Not Selected]** ### **Results for question 81.** 81 1 / 1 point **Your friend in another state is having a problem with their Windows 11 Home edition computer and wants your help. What could you do to provide the quickest possible help?** VPN , Not Selected RDP , Not Selected **[Correct answer:]** **[MSRA]** RMM , Not Selected ### **Feedback** #### **Based on answering correctly** Microsoft Remote Assistance (MSRA) is your best option, and really the only one unless you are a managed service provider (MSP) and already have remote monitoring and management (RMM) set up on their computer. RDP is not available on Windows Home editions, and a virtual private network (VPN) is usually used for connecting remotely to a network as if you were sitting in the office. It also requires some configuration. MSRA allows you to co-control the user\'s desktop. ### ### ### **Results for question 82.** 82 1 / 1 point A user enabled a mobile device\'s screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user\'s concern? Remote wipe , Not Selected Device encryption , Not Selected **[Correct answer:]** **[Failed login restrictions]** Anti-Malware , Not Selected ### **Results for question 83.** 83 1 / 1 point A user logs onto their computer system and notices that several of their files are missing and some are renamed. What should you do? Reimage the machine , Not Selected **[Correct answer:]** **[Begin the malware removal process]** Restore the files from a backup , Not Selected Restore from the last restore point , Not Selected ### **Feedback** #### **Based on answering correctly** This is a classic symptom of malware. Your first job is to remove it. The seven steps of the malware removal process are as follows: Investigate and verify malware symptoms. Quarantine infected systems. Disable System Restore in Windows. Remediate infected systems. Update anti-malware software. Scanning and removal techniques (e.g., safe mode, preinstallation environment). Schedule scans and run updates. Enable System Restore and create a restore point in Windows. Educate the end user. ### **Results for question 84.** 84 1 / 1 point Which of the following features are not available in the Home edition of Windows but are available in Pro and higher editions of Windows? (Choose three.) Answer, File compression **[Correct answer:]** **[Group policy editor]** **[Correct answer:]** **[RDP]** **[Correct answer:]** **[Join a windows Domain]** ### **Results for question 85.** 85 1 / 1 point A friend asks you what jailbreaking a device is and if they should do it. Which of the following is not true about jailbreaking? Jailbreaking might be illegal depending on where you are in the world. , Not Selected **[Correct answer:]** **[Jailbreaking is a safe way to get more out of your device.]** Jailbreaking is like cracking software or gaining root access to a phone, which makes your device more vulnerable to attack. , Not Selected Jailbreaking gives the user full access to the device and on an iPhone, it allows the user to download apps not approved by Apple. , Not Selected ### **Feedback** #### **Based on answering correctly** Jailbreaking does let you do more with your device, but it isn\'t necessarily safe or legal. Jailbreaking is most commonly done with Apple devices because they are more locked down than Android or Windows devices are. Jailbreaking an iPhone, for instance, allows the user to install apps that are not approved by Apple. When you open the device up for yourself by cracking software or gaining root access, it also opens your device up more for cybercriminals to perpetrate an attack on it. Jailbreaking also voids the warranty on your device. The device may become unstable, and with the warranty voided, you are not likely to receive support in fixing problems. Jailbreaking may be illegal depending on where you are in the world. ### **Results for question 86.** 86 1 / 1 point You need to configure encryption for the data-at-rest on a new Windows Pro workstation. Which of the following are options? (Choose two.) Answer, Kerberos **[Correct answer:]** **[BitLocker]** **[Correct answer:]** **[EFS]** Answer, RADIUS ### **Feedback** #### **Based on answering correctly** For data-at-rest, which means it\'s on a storage media, your options are Encrypting File System (EFS) and BitLocker. BitLocker is more secure and would be preferred. Kerberos and RADIUS secure information that is moving (data-in-transit/motion) between two points. ### **Results for question 87.** 87 0 / 1 point You have a macOS computer that is behaving in an unstable manner, so you press the Command+R keys while it is booting and enter Disk Utility. What option in Disk Utility will check and repair the filesystem? Incorrect answer: Restore Partition , Not Selected **[First Aid]** **[, Not Selected]** Erase , Not Selected ### **Results for question 88.** 88 1 / 1 point You have just installed a second and third hard drive into a Windows Pro workstation. Each drive is 500 GB. The user wants to combine the two drives into one 1 TB volume. What should you create from those two drives to accomplish this and give the user a disk read and write performance boost? **[Correct answer:]** **[Striped Volume]** Mirrored Volume , Not Selected Spanned Volume , Not Selected Simple Volume , Not Selected ### **Results for question 89.** 89 1 / 1 point The network you manage has a dozen Windows workstations. You want to ensure that users do not have the ability to change the boot order so that they can\'t boot to an unauthorized device. Which step should you take? Restrict user permissions. , Not Selected **[Correct answer:]** **[Set a BIOS/UEFI password.]** Disable Autorun. , Not Selected Enable a strong password policy. , Not Selected ### ### ### ### **Results for question 90.** 90 1 / 1 point A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST? Incremental , Not Selected **[Correct answer:]** **[Full]** Differential , Not Selected Non-Parity 0 / 1 point Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop? Pro , Not Selected Enterprise , Not Selected Incorrect answer: Home Pro for workstations , Not Selected Results for question 2. 2 1 / 1 point A user has a computer that suddenly started running very sluggishly. Upon inquiry, you find that they wen to some websites yesterday that they don\'t normally visit, so you decide to follow the best practice procedures for malware removal. What is the first step? Correct answer: Investigate and verify malware symptoms. Disable System Restore in Windows. , Not Selected Quarantine infected systems. , Not Selected Schedule scans and run updates. , Not Selected Feedback Based on answering correctly The seven steps of the malware removal process are as follows: Investigate and verify malware symptoms. Quarantine infected systems. Disable System Restore in Windows. Remediate infected systems. Update anti-malware software. Scanning and removal techniques (e.g., safe mode, preinstallation environment). Schedule scans and run updates. Enable System Restore and create a restore point in Windows. Educate the end user. Results for question 3. 3 1 / 1 point You are logged into a Linux workstation with a regular user account. You need to execute a command with root permissions. Which command do you need to use? man , Not Selected Correct answer: sudo grep , Not Selected su , Not Selected Results for question 4. 4 1 / 1 point Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications? Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed , Not Selected Install and run Linux and the required application in a PaaS cloud environment , Not Selected Set up a dual boot system by selecting the option to install Linux alongside Windows , Not Selected Correct answer: Install and run Linux and the required application as a virtual machine installed under the Windows OS Results for question 5. 5 1 / 1 point A user calls the help desk because they are not able to access the Internet. After asking a few questions, you discover that if they type in IP address in the browser, then the website pops up. Other users on the same switch aren\'t having this problem. Where will you start looking for the problem? Web Server , Not Selected File server , Not Selected Correct answer: DNS Settings DHCP Settings , Not Selected Feedback Based on answering correctly If you can reach a website using an IP address, then the problem has something to do with DNS settings. The default DNS server can be configured using DHCP settings, but since the other users aren\'t having this problem, it\'s not a setting on the DHCP server. That means it must be configured on the local computer. The user is able to reach the file server, and if they\'re accessing a remote website the problem wouldn\'t be your company\'s web server. Results for question 6. 6 1 / 1 point Your client has computers using macOS and other computers that are Windows-based. They want to have a shared drive configured so that both operating systems can access it. The files are very large, some of them exceeding 4 GB. What filesystem should you use to format the shared drive? ext4 , Not Selected Correct answer: exFAT NTFS , Not Selected FAT32 , Not Selected Feedback Based on answering correctly FAT32 and exFAT are both compatible with both Windows and macOS systems, but the exFAT filesystem supports files greater than 4 GB; FAT32 does not. NTFS is only compatible with Windows, ext4 is used in Linux/Unix systems, and Apple File System (APFS) is the filesystem for macOS 10.13 and later. Results for question 7. 7 1 / 1 point A user calls and complains that they can\'t see any printers when they try to print a document from their Windows computer. They say that they had three network printers showing yesterday, and they can access the server across the network. What will you do first? Reinstall Windows , Not Selected Reinstall the network printers , Not Selected Correct answer: Check the status of the Print Spooler service. Repair Windows , Not Selected Feedback Based on answering correctly B. Check the simple things first. If the Print Spooler service isn\'t running, then printers will not show. It\'s unlikely that you would need to reinstall or repair Windows. Results for question 8. 8 1 / 1 point Your company works with confidential government files. It is illegal for employees to copy any files to flash drives. Where do you specify this as well as the penalties for not complying with the rule? APK , Not Selected ADF , Not Selected Correct answer: AUP ACL , Not Selected Results for question 9. 9 1 / 1 point When you want to identify the chipset of a motherboard, where should you look? On the Power Supply , Not Selected On the motherboard , Not Selected On the CPU , Not Selected Correct answer: In the manufacturers documentation Results for question 10. 10 0 / 1 point A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO) Answer, Install a new hard drive and clone the user\'s drive to it Correct answer: Scan the computer with the company-provided antivirus software Answer, Uninstall the company-provided antivirus software Answer, Deploy an ad-blocking extension to the browser. Incorrect answer: Perform a reset on the user\'s web browser Selected Answer - Incorrect Answer, Click the link in the messages to pay for virus removal Results for question 11. 11 1 / 1 point Occasionally when visiting websites using Google Chrome, you receive a pop-up window in front of your browser. Generally, it\'s an advertisement trying to sell you something. Which of the following actions will stop this from happening? Correct answer: Enable Chrome\'s pop-up blocker. Install anti-malware software to stop the adware. , Not Selected Enable Windows Firewall. , Not Selected Install an antivirus program. , Not Selected Results for question 12. 12 1 / 1 point You\'re in the middle of a major IT systems change and have gotten to a point where you realize that it\'s not going to work without shutting down everything for a week. This would cost the company a fortune and will put production way behind. What will you do? Follow the AUP. , Not Selected Correct answer: Follow the rollback plan. Fire the responsible staff member. , Not Selected Let the management know and continue with the project. , Not Selected Feedback Based on answering correctly A case like this is exactly why you have a rollback plan. Occasionally, despite your best efforts, you get into a project and discover that it isn\'t going to work, or it will take longer than expected. Perhaps if you rework the plan you could make the changes without a big disruption to the business. Involving management in what is going on is always a good idea. The acceptable use policy (AUP) likely doesn\'t have any bearing here. Results for question 13. 13 1 / 1 point A Windows computer user reports that their computer just completely locked up. On the screen is a message saying that the person pictured has participated in an illegal activity. The webcam turned on by itself, and the computer user was pictured. The message also says they can resolve the charges against them by paying a \$500 fine. They are understandably shaken by the incident. What should you do next? Delete and reinstall Windows. , Not Selected Correct answer: Boot to a bootable media from your anti-malware provider and run a remediation. Tell the user that if they performed an illegal activity with their work computer, their employment will be terminated. , Not Selected Pay the fine , Not Selected Results for question 14. 14 1 / 1 point A technician is troubleshooting a customer\'s PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician\'s actions? Set & Meet deadlines , Not Selected Adhere to users privacy policy , Not Selected Correct answer: Avoid distractions Deal appropriately with customers confidential material , Not Selected Results for question 15. 15 1 / 1 point Which of the following is an advantage of using share permissions over using NTFS permissions? Correct answer: Share permissions can be enabled to secure resources across the network that are not on an NTFS partition. Share permissions will override NTFS permissions if there is a conflict. , Not Selected Share permissions are able to be set at the file level, whereas NTFS permissions can be set only at the folder level. , Not Selected Share permissions apply when users access a resource across the network, but NTFS permissions apply only to local users. , Not Selected Feedback Based on answering correctly B.The one big advantage of share permissions is that they can be used if the NTFS filesystem is not in place. Of course, share permissions are in effect only when the user connects to the resource via the network. NTFS permissions are able to protect at the file level. Share permissions can be applied to the folder level only. NTFS permissions can affect users logged on locally or across the network to the system where the NTFS permissions are applied. Results for question 16. 16 1 / 1 point You are training mobile users on potential security risks. Which of the following could make users more susceptible to an on-path attack? Correct answer: Unintended Wi-Fi connection Unauthorized camera activation , Not Selected Unauthorized location tracking , Not Selected Unauthorized account access , Not Selected Results for question 17. 17 1 / 1 point You\'re at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren\'t moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you\'ve been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action? Unhook the network cable. , Not Selected Close the lid on the laptop. , Not Selected Turn the laptop\'s power off. , Not Selected Correct answer: Turn on Airplane mode. Feedback Based on answering correctly A. The quickest way to thwart this would-be attacker is to turn on Airplane mode. This disconnects all of your wireless connections and is usually done by pressing a key or two, such as the Fn key and whichever F key has a picture of an airplane on it. There is no network cable to disconnect if you are on Wi-Fi, and what closing the lid does depends on how the computer is configured. It may do nothing. If you turn the laptop\'s power off, you will lose whatever you have been working on. Results for question 18. 18 1 / 1 point Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident? Spoofing , Not Selected Scareware , Not Selected Pretexting , Not Selected Correct answer: Vishing Results for question 19. 19 1 / 1 point You are planning on formatting a hard drive with NTFS that will be used to share files between Windows 10 and Windows 11 Pro computers. Which of the following features are present in NTFS? (Choose two.) Correct answer: File and folder encryption Correct answer: File compression Answer, Enhanced flash drive support Answer, Linux OS support Results for question 20. 20 1 / 1 point Computer users are often reluctant to have anything change, so gaining their acceptance prior to the change will make a transition run more smoothly. What are two ways that you can gain end-user acceptance to a change? (Choose two.) Correct answer: Thoroughly explain why this change is necessary. Correct answer: Involve them in the planning process. Answer, Make them fill out request forms. Answer, Don\'t tell them and just have the change done when they come in on a Monday. Feedback Based on answering correctly No one likes to have changes forced on them, but in IT there are changes every day. When you have a major change, your headaches will be less if you can gain end-user acceptance before the change happens. Two of the best ways to do this are to involve them in the parts of the planning process that affect them, such as user input screens. Have a meeting and listen to input from the people who will actually be using the system. They may have some insight that you don\'t. Also be sure to thoroughly explain why the change is necessary. The worst thing to do is spring the change on them by not telling them about it and having them discover it when they log in Monday morning. Results for question 21. 21 1 / 1 point A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need? administrator account , Not Selected guest account , Not Selected standard account , Not Selected Correct answer: power user account Feedback General Feedback A Power User account provides more permissions than a Standard Account but less than an Administrator Account. It allows access to advanced features and configuration settings for several applications without full administrative privileges. Corporate policy requires a least privilege environment, which means minimizing permissions to what is necessary. While an Administrator Account would give access to all system settings, it\'s more than required and can pose a security risk. Standard Account and Guest Account would likely not provide sufficient access to advanced features and configuration settings. So, the Power User Account strikes the balance by giving necessary permissions while aligning with the least privilege policy. Results for question 22. 22 1 / 1 point A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage? Completed an inventory of tools before use , Not Selected Practiced electrical fire safety , Not Selected Correct answer: Connected a proper ESD strap Removed all jewelry , Not Selected Results for question 23. 23 0 / 1 point You have installed a second hard drive in a Windows workstation. In Disk Management, what type of partition can you create that will allow you to create an unlimited number of logical partitions in it? Incorrect answer: Dynamic Extended , Not Selected Logical , Not Selected GPT , Not Selected Feedback Based on answering incorrectly When you create a partition in Windows 10, it will ask if you want to create a master boot record (MBR) or GUID Partition Table (GPT) partition. GPT is newer and has far more features. One of those features is that you can create an unlimited number of logical partitions on it. Only the operating system will limit you; Windows 10 will only allow 128 partitions on one drive. Windows 11 supports only the GPT partition type. Results for question 24. 24 0 / 1 point You have a situation that requires installing Windows 11 from installation media. You\'ll be launching Setup on the media while you are on the existing Windows 10 desktop. Which of the following is not an option? Incorrect answer: Full upgrade Clean install , Not Selected Forensic install , Not Selected Keep data only , Not Selected Results for question 25. 25 0 / 1 point A user needs to travel for a presentation and wants to be sure their laptop does not run off battery power, so they want to turn it off. However, they want to leave their files and applications running, so that when they turn it back on, the applications are already open. Which of the following statements is true? The user will be unable to do this. , Not Selected The user should have their computer hibernate. , Not Selected The user should put their computer into standby mode. , Not Selected Incorrect answer: The user needs to activate the sleep power plan. Results for question 26. 26 1 / 1 point When your friend launches their new favorite game, they often get low memory warnings. Which two of the following can you do to prevent this problem from happening in the future? (Choose two.) Correct answer: Increase virtual memory. Correct answer: Increase physical memory. Answer, Put in a faster NIC Answer, Use Task Manager to end unnecessary programs. Results for question 27. 27 1 / 1 point A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference? Disabling the SSID broadcast , Not Selected Modifying the wireless security , Not Selected Changing the AP name , Not Selected Correct answer: Changing channels Results for question 28. 28 1 / 1 point A user has a 32-bit application that they want to use on a 64-bit operating system and they have asked you if that will work. What do you tell them? No, the application must be 64-bit to run on a 64-bit operating system. , Not Selected Correct answer: Yes, a 32-bit application will work on a 64-bit operating system. 32-bit and 64-bit are interchangeable. , Not Selected A 64-bit application will run on a 32-bit operating system, but a 32-bit application will not run on a 64-bit operating system. , Not Selected Feedback Based on answering correctly A 64-bit operating system will support both 32-bit and 64-bit applications. A 32-bit application will work on a 64-bit operating system, but it won\'t take advantage of the 64-bit speed. It will essentially run half as fast as a 64-bit application would. 32-bit operating systems only support 32-bit programs; you can\'t run a 64-bit application on a 32-bit operating system. Luckily, there aren\'t many computers with 32-bit operating systems around anymore. Results for question 29. 29 1 / 1 point A small business has two servers in their telecommunications room. They\'ve come seeking your advice because the area has frequent power outages and they have lost important data on their servers as a result. What will you recommend for them to protect against this issue? Surge suppressor , Not Selected Power strip , Not Selected Line conditioner , Not Selected Correct answer: Battery backup Results for question 30. 30 0 / 1 point A small office\'s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.) Answer, Outdated firmware Incorrect answer: WEP Selected Answer - Incorrect Answer, WPS Answer, Guest network Answer, TKIP Correct answer: Default Login Results for question 31. 31 1 / 1 point A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? Correct answer: Name server Host address , Not Selected Default gateway , Not Selected Subnet mask , Not Selected Results for question 32. 32 0 / 1 point A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange: What does the user need? Incorrect answer: Passwords Root CA , Not Selected Keys , Not Selected Tokens , Not Selected Results for question 33. 33 1 / 1 point Which feature of Windows Pro or higher editions is designed to encrypt storage volumes, must be activated by an administrator, and can encrypt operating system startup files? EFS , Not Selected ShadowDrive , Not Selected OneDrive , Not Selected Correct answer: BitLocker Results for question 34. 34 0 / 1 point When configuring NTFS permissions on a Windows workstation, what is the recommended method? Put user accounts into groups. Grant permissions to groups. , Not Selected Put user accounts into groups. Grant folder permissions to users and file permissions to groups. , Not Selected Incorrect answer: Put user accounts into groups. Grant folder permissions to groups and file permissions to users. Grant permissions to user accounts. , Not Selected Feedback Based on answering incorrectly The recommended way to assign permissions on Microsoft systems is to grant them to groups. Then, users can be assigned to groups depending on their access needs. This is far less work than managing permissions on a user-by-user basis. Results for question 35. 35 0 / 1 point You want to protect mobile device users on your network from potentially leaked files or data. Which of the following should you do to help reduce this risk? (Choose two.) Answer, Enforce data transmission over limits. Incorrect answer: Install mobile firewalls. Selected Answer - Incorrect Answer, Disable network autoconnect. Correct answer: Enable device encryption. Feedback Based on answering incorrectly When authorized users access devices through unintended connections or unauthorized users access stolen devices, they can access the data on the device. Disable autoconnect to avoid unintended connections and encrypt data on devices to help protect the data on them in the event they are stolen. Results for question 36. 36 1 / 1 point You are on-site fixing a client\'s laptop that will not load the OS. You are waiting to hear about your friend\'s awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You\'re sure that all your friends are texting information about the party. What should you do? (Choose two.) Correct answer: Ignore your phone. Answer, Text your friends back and tell them that you are working. Answer, Call your friend and tell them to wait until after this job before planning all the details because you want to help. Correct answer: Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won\'t be a problem now. Results for question 37. 37 1 / 1 point A user who is less comfortable with technology is having to navigate through File Explorer to a network shared resource several times a day. The user asks if there is an easier way. What will you configure for this user? Gateway , Not Selected Subnet Mask , Not Selected Domain Name , Not Selected Correct answer: Mapped Drive Feedback Based on answering correctly Mapping a network drive for this user will make navigating to the resource much easier. A domain name identifies a Windows Active Directory domain. A subnet mask is used in IPv4 networking, and a gateway is the proxy server, router, or other device that connects a user to other networks, including the Internet. Results for question 38. 38 1 / 1 point An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software\'s cloud server. Which of the following is MOST likely to be of concern to the IT manager? Correct answer: Network utilization will be significantly increased due to the size of CAD files All updated software must be tested with alt system types and accessories , Not Selected Large update and installation files will overload the local hard drives. , Not Selected Extra technician hours must be budgeted during installation of updates , Not Selected Results for question 39. 39 1 / 1 point A user reports that their profile is very slow to load, then they get an error message that says, \"unable to load profile.\" What should you suspect? The user logged on using the wrong password. , Not Selected The profile is too large. , Not Selected Correct answer: The profile is corrupted. They need to reboot and try again. , Not Selected Feedback Based on answering correctly If a user profile is very large, it may be slow to load but it should eventually get there. If there is an error message that it is unable to load, suspect a corrupted profile. To verify that\'s the problem, create a new user and copy the existing user profile to the new user, then try to log on as the new user. If the same error occurs, the profile is corrupted. You\'ll need to delete the corrupted profile and when the user logs on again, a new profile will be created. Results for question 40. 40 1 / 1 point After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature? Update the AUP , Not Selected Create a network login script , Not Selected Correct answer: Push a group policy Assign a local security policy , Not Selected Results for question 41. 41 1 / 1 point You are instructing a new Mac user on the features of macOS. They ask if the system is capable of storing their passwords to various Internet sites. Which feature would they use for that? Correct answer: Keychain FileVault , Not Selected Mission Control , Not Selected Terminal , Not Selected Results for question 42. 42 1 / 1 point A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? Internet Options - Advanced , Not Selected Internet Options - Content , Not Selected Correct answer: Internet Options - Connections Internet Options - Privacy , Not Selected Results for question 43. 43 1 / 1 point An Android phone user reports that their phone can\'t connect to the Wi-Fi network, but they have a cellular signal. What is the first thing to have them try? Adjust the Wi-Fi signal receptivity. , Not Selected Correct answer: Check whether the Wi-Fi is enabled. Check whether the phone is in Airplane mode. , Not Selected Reset to factory defaults. , Not Selected Results for question 44. 44 1 / 1 point You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content? Online content is protected through terms established by Microsoft. , Not Selected Online content can not be protected through the use of DRM. , Not Selected Online content is considered open source; therefore, you may use whatever you find. , Not Selected Correct answer: Online content can be protected through the use of DRM. Results for question 45. 45 1 / 1 point You are writing a script in Microsoft PowerShell to automate some processes that you perform daily. What file extension will the script file have?.bat , Not Selected Correct answer:.ps1.py , Not Selected.vbs , Not Selected Results for question 46. 46 0 / 1 point A management directive requires that you keep hard copies of all your workstations\' system configurations. You have all Windows workstations. Which command can you use to easily gather this information for remote workstations and save a report as a text file? mmc , Not Selected Incorrect answer: compmgmt perfmon , Not Selected msinfo32 , Not Selected Results for question 47. 47 1 / 1 point A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company\'s compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow? Require files to be individually password protected with unique passwords , Not Selected Configure a hardened SFTP portal for file transfers between file servers , Not Selected Deploy a secondary hard drive with encryption on the appropriate workstation , Not Selected Correct answer: Enable BitLocker To Go with a password that meets corporate requirements Results for question 48. 48 0 / 1 point A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft? Disk encryption , Not Selected USB drive encryption , Not Selected File encryption , Not Selected Incorrect answer: Data in transit encryption Results for question 49. 49 1 / 1 point change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process? communicate to stakeholders , Not Selected sandbox testing , Not Selected perform risk analysis , Not Selected Correct answer: end user acceptance Results for question 50. 50 1 / 1 point Which of the following uses a remote access server to forward a user\'s logon password to an authentication server, allowing or denying access to a system? TKIP , Not Selected Correct answer: TACACS WPA2-PSK , Not Selected AES , Not Selected Results for question 51. 51 1 / 1 point You\'re installing a new video card in a computer. It was an expensive card and you want to ensure that it isn\'t damaged by ESD. Until you are ready to place the card in the slot, what is the safest place for the card? Lying on the antistatic bag , Not Selected Lying on the antistatic mat , Not Selected Lying on the edge of the computer so that it\'s grounded , Not Selected Correct answer: Inside its antistatic bag Results for question 52. 52 1 / 1 point You\'re trying to share pictures with your friends. You both have iPhones, but your AirDrop doesn\'t seem to be working. Which of the following might solve the problem? (Choose two.) Answer, Turn on both hotspots Correct answer: Turn Bluetooth on Correct answer: Ensure both devices are discoverable Answer, Turn airplane mode on Results for question 53. 53 1 / 1 point Your company does a full backup every Sunday and incremental backups all the other days of the week at the end of the day. If you come in on Wednesday morning and your system has crashed, what backups will need to be restored so that your system will be fully recovered? Correct answer: Sunday Monday and Tuesday Sunday and Tuesday , Not Selected Sunday & Monday , Not Selected Sunday only , Not Selected Feedback Based on answering correctly Incremental backups will only back up what has changed since the last full backup or the last incremental backup. An incremental or full backup resets the archive bit, so only Monday\'s changes will be backed up on Monday, only Tuesday\'s changed files will be backed up on Tuesday, and only Wednesday\'s changed files will be backed up on Wednesday. You will need to restore all three backups to get all the changes that occurred since Sunday. Results for question 54. 54 1 / 1 point A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor\'s website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue? Disable the mobile hotspot. , Not Selected Increase the data plan limits , Not Selected Correct answer: Uninstall the fraudulent application Reset the phone to factory settings , Not Selected Results for question 55. 55 0 / 1 point You\'re on your smartphone and notice that the apps are all responding slowly, almost jittery when you change from one to the other. What is the first thing to do? Suspect a virus , Not Selected Check the storage on the device , Not Selected Incorrect answer: Close some running apps Check the battery charge , Not Selected Feedback Based on answering incorrectly If a battery is very low, the applications can show a slower than normal response time. If this continues when the phone is charged, see how full your phone is. If it\'s slow when you\'re saving or reading files, then you may need to clear out some space on the phone. Make sure your phone is updated. If it\'s an Android phone, ensure that your anti-malware is updated. If the problem is happening with just one app, try updating the app, clearing the app\'s cache, or removing and reinstalling the app. Results for question 56. 56 0 / 1 point An application on your mobile device has crashed and is unresponsive. What should be your first choice to fix it? Restart the device , Not Selected Force close the application , Not Selected Incorrect answer: Reinstall the application Revert to factory defaults , Not Selected Feedback Based on answering incorrectly The first step for any unresponsive app on your mobile device is to force-close it. How that is done will be different depending on whether it is an Apple or an Android device. If the app is still causing problems, you can try restarting your device, and if that doesn\'t work, uninstall and reinstall the application. Reverting your mobile device to factory defaults shouldn\'t be necessary. Results for question 57. 57 1 / 1 point A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting? Correct answer: Check for any installed patches and roll them back one at a time until the issue is resolved Run both CPU and memory tests to ensure that all hardware functionality is normal , Not Selected Install alternate open-source software in place of the applications with issues , Not Selected Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications. , Not Selected Results for question 58. 58 1 / 1 point You\'re working at your desktop computer, viewing a web page you use often, when a website that you know should be updating doesn\'t seem to be. In fact, if you access it from a different device, the website looks different. What can you do to force the website to update on your computer? (Choose two.) Answer, Uninstall and reinstall your browser. Correct answer: Clear the browser\'s cache. Correct answer: Clear the browser\'s stored cookies. Answer, Hold the Ctrl Key and F key simultaneously while on the website. Feedback Based on answering correctly Websites store parts of pages in the cache to make loading them faster the next time. If you clear the browser\'s cache and cookies, then when you access the website, it must download all of the data that was previously cached which means that it will be the updated version. It may take a little longer, but it will be up-to-date. If it\'s a site where you use cached credentials to log in, you must log in again. Uninstalling and reinstalling your browser isn\'t necessary. The Ctrl key and F key pressed simultaneously usually bring up a Find dialog box. Results for question 59. 59 1 / 1 point Your company makes a full backup every Sunday. Monday through Friday they create differential backups. They keep the weekly backup for a month, the daily backups are overwritten each week, and they make a backup once a month that is kept for a year. What is this backup scheme called? On-Site / Off-Site , Not Selected Synthetic , Not Selected Correct answer: Grandfather Father Son 3-2-1 Backup rule , Not Selected Feedback Based on answering correctly The grandfather-father-son (GFS) method of backing up, as described in the question, ensures that there are short-term, medium-term, and long-term backups of a system. You should have backups both on-site and off-site. The 3-2-1 backup rule says you should have three copies of data, using two different types of media, and one should be off-site. A synthetic backup is a full backup created by combining a recent full backup and the changes since then to create new files. It can be done outside the system, so there is no downtime and it\'s faster than doing a full backup. Results for question 60. 60 1 / 1 point You have a Windows Pro workstation installed in a workgroup. There is no centralized security. Which tool should you use to help protect yourself against malicious network attacks? Correct answer: Windows Defender Firewall Local Security Policy , Not Selected Computer Management , Not Selected NTFS Permissions , Not Selected Feedback Based on answering correctly Windows 10 and 11 both incorporate Windows Defender Firewall with Advanced Security, which can be used to stop incoming and outgoing network traffic. Traffic is allowed or denied by specific rules that are part of an access control list (ACL). By default, Windows Defender Firewall blocks incoming traffic. By creating exceptions, you can configure what incoming traffic you want to allow through. NTFS permissions are used to configure user access to files, folders, and volumes. Local Security Policy is used to configure items such as password policy and account lockout policies. Computer Management is a Microsoft Management Console with several frequently used tools. Results for question 61. 61 1 / 1 point What type of repair tool was introduced with Windows 7 as a way to restore from a full hard-drive snapshot? task manager , Not Selected safe mode , Not Selected Correct answer: system image recovery reset this pc , Not Selected Results for question 62. 62 1 / 1 point Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key. Which of the following is MOST likely the cause? Correct answer: Ransomware Rootkit , Not Selected Cryptomining , Not Selected Keylogger , Not Selected Results for question 63. 63 0 / 1 point One of the users you are responsible for called the help desk because when they turned the computer on this morning, instead of booting into Windows, it showed a green screen with 1s and 0s running down it. What will you do? Incorrect answer: Boot into safe mode and restore from a recent restore point. Turn the computer off and boot using boot media from your antivirus company. , Not Selected Go into WinRE and perform a clean installation of the operating system. , Not Selected Go into WinRE and repair the operating system installation. , Not Selected Feedback Based on answering incorrectly The computer is running a virus program before the operating system even boots, which indicates that there is a boot sector virus. The best way to remove this malware is using boot media from your antivirus company to clean the computer. You may need to go into the BIOS/UEFI settings and change the boot order to boot to the anti-malware media. You wouldn\'t need to repair or replace the operating system yet, although as part of the remediation you may need to. It is unlikely with this scenario that you would be able to boot into safe mode, and even if you did, the malware could be lurking in the restore point. Part of the best practice procedures for malware removal is to disable System Restore in Windows. Results for question 64. 64 1 / 1 point Which of the following should be enacted to reduce a company\'s liability and exposure to a potential lawsuit? Password compliance policy , Not Selected Incident documentation policy , Not Selected Correct answer: Acceptable use policy Change control policy , Not Selected Results for question 65. 65 1 / 1 point You are required to enter a username, password, and a code from an authenticator app on your phone before you can access the company website. What type of authentication is this? Single Sign on , Not Selected Multi Sign on , Not Selected Domain , Not Selected Correct answer: Multifactor Feedback Based on answering correctly This is a classic example of multifactor authentication. The username identifies you; the password (something you know) and the authenticator app code (something you have) are multiple ways to prove (authenticate) who you are. The four types of authentication are something you know, something you have, something you are (biometrics), and some place you are. Results for question 66. 66 1 / 1 point A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine? Correct answer: ifconfig or ip -a sudo , Not Selected chmod , Not Selected grep , Not Selected Results for question 67. 67 1 / 1 point You are going to move a desktop computer from one office location to another. It\'s on the floor, underneath the desk. Which of the following are good personal safety procedures to follow? (Choose two.) Answer, Bend at the waist and lift straight up

Use Quizgecko on...
Browser
Browser