PdfPrep.com

220-1002 CompTIA Online Free Test

These 220-1002 questions and answers provide you with the experience of taking the actual test. Our 220-1002 Exam is not just questions and answers. They are your access to high technical expertise and accelerated learning capacity. Our 220-1002 Certification preparation questions will make you feel like you are taking an actual exam at a Prometric or VUE center.

Page 1 of 33

Loading... Loading...
1. Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet?

Loading... Loading...
2. Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized.

Which of the following messages will be displayed?

Loading... Loading...
3. Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.

Which of the following is the FIRST step the technician should take to correct this issue?

Loading... Loading...
4. A user wants to see the workstations present on the LAN in a workgroup environment.

Which of the following settings must be enabled to make this possible?

Loading... Loading...
5. A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user.

Which of the following commands should the administrator run on the user’s workstation?

Loading... Loading...
6. Which of the following technologies is used by malicious employees to obtain user

passwords?

Loading... Loading...
7. An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.



INSTRUCTIONS

Select the MOST appropriate statement for each response.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.





Let’s take a look at your phone settings.









Please change the port number on your mail settings to 993.

Which of the following should be done NEXT?

Loading... Loading...
8. A company seized an employee's laptop due to illegal activity. The computer has been locked in an office until it can be turned over to authorities. and no one is allowed to log on to it.

Which of the following policies is this an example of?

Loading... Loading...
9. Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?

Loading... Loading...
10. A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection.

Which of the following will the technician MOST likely use to connect to the server?

Page 2 of 33

Loading... Loading...
11. Which of the following must be enabled to configure 20 new machines to be booted over a network?

Loading... Loading...
12. Which of the following is considered government-regulated data?

Loading... Loading...
13. Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Loading... Loading...
14. A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure.

Which of the following should the technician perform FIRST?

Loading... Loading...
15. A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss.

Into which of the following power sources should the technician plug the system to offer optimal uptime?

Loading... Loading...
16. A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.

Which of the following steps should be taken FIRST to determine the cause of the issue?

Loading... Loading...
17. A company is implementing multifactor authentication and requires a solution that utilizes TCP.

Which of the following will the company MOST likely select?

Loading... Loading...
18. A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting.

Which of the following steps should the technician take NEXT?

Loading... Loading...
19. A user is unable to open a document on a shared drive from a Linux workstation.

Which of the following commands would help the user gain access to the document?

Loading... Loading...
20. A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found.

Which of the following is the MOST likely cause of the issue?

Page 3 of 33

Loading... Loading...
21. A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom.

Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

Loading... Loading...
22. A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible.

Which of the following technologies should the technician use to manage this system?

Loading... Loading...
23. A healthcare institute has asked the IT department to help protect medical and financial data.

Which of the following regulations is the healthcare provider MOST concerned about? (Select TWO)

Loading... Loading...
24. A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level.

Which of the following should the technician configure?

Loading... Loading...
25. Which of the following operating systems is based on UNIX source code and is closed source?

Loading... Loading...
26. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

Loading... Loading...
27. Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

Loading... Loading...
28. A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow for Its flies to be recovered at an alternate location within a few days following a disaster.

Which of the following backup methodologies will the technician MOST likely recommend?

Loading... Loading...
29. Which of the following is protected data that can be found in a medical record?

Loading... Loading...
30. A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed.

Which of the following is the MOST likely cause of the issue?

Page 4 of 33

Loading... Loading...
31. Which of the following standards controls the processing of credit cards?

Loading... Loading...
32. A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.

If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

Loading... Loading...
33. A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue.

According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?

Loading... Loading...
34. While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program.

Which of the following is the BEST option given the solution?

Loading... Loading...
35. Which of the following should a technician do FIRST before opening a computer case to replace a part?

Loading... Loading...
36. A customer built a computer with the following specifications:

- Single hexa-core processor

- 8GB DDR4 memory

- 256GB SSD drive

- Built-in graphics card

- 32-bit Windows OS

- Audio editing software

The computer seems to be working, but the OS reports only 3.5GB of RAM is available.

Which of the following would correct the issue?

Loading... Loading...
37. A technician is troubleshooting vendor-specific software.

Which of the following is where the technician should go to find problem-specific fixes on the vendor's website?

Loading... Loading...
38. A company needs a software package for a new branch office.

Which of the following license should the business purchase to allow correct licensing of the software?

Loading... Loading...
39. A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.

Which of the following Control Panel utilities should the technician use to accomplish this task?

Loading... Loading...
40. A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.

Which of the following should the technician replace to prevent these issues in the future?

Page 5 of 33

Loading... Loading...
41. A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard.

Which of the following would be BEST suited for this task?

Loading... Loading...
42. Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.

Which of the following is MOST likely the cause?

Loading... Loading...
43. A technician is able to connect to a website: however, the technician receives the following error, when alternating to access a different website: Page cannot be displayed.

Which of the following command line tools would be BEST to identify the root cause of the connection problem?

Loading... Loading...
44. A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date.

Which of the following filesystem types would the customer’s drive require?

Loading... Loading...
45. A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar.

To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

Loading... Loading...
46. Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.

Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

Loading... Loading...
47. Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues.

Which of the following should a technician use to continue troubleshooting the issue?

Loading... Loading...
48. A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My Documents” folder is empty, and personal settings are reset.

Which of the following would be required to resolve the issue?

Loading... Loading...
49. Ann, an employee, recently reported to the company's IT technician that her smartphone is exhibiting strange behavior. When she opens the application store. an error appears that indicates there is no connection However, the phone still receives emails and can access the Internet from the browser. The phone was backed up recently and auto-connects to a VPN.

Which of the following troubleshooting steps should the technician take NEXT? (Select TWO).

Loading... Loading...
50. Which of the following would MOST likely be used in secure client-server communication?

Page 6 of 33

Loading... Loading...
51. A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

Loading... Loading...
52. Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Loading... Loading...
53. An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization’s mailing list.

Which of the following should be performed to remove and prevent any further emails from this organization?

Loading... Loading...
54. A customer is shopping for a new tablet. The customer is primarily concerned about transferring applications from the old tablet to the new one.

Which of the following specifications is MOST important when selecting a new tablet?

Loading... Loading...
55. A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

Loading... Loading...
56. A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.

Which of the following is MOST likely causing the missing folders issue?

Loading... Loading...
57. Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

Loading... Loading...
58. After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.

When testing the policy, a removable drive is plugged in but can still be accessed.

Which of the following command-line tools should the technician use to apply the new policy?

Loading... Loading...
59. A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user.

Which of the following will support this task''

Loading... Loading...
60. A technician is troubleshooting a home WiFi router that is used by a small company of 30 employees. The business is experiencing intermittent wireless connectivity issues.

Which of the following is the MOST likely cause of the issues'?

Page 7 of 33

Loading... Loading...
61. A technician is developing a backup and disaster recovery plan for a customer. The customer requires quick file recovery when necessary, but wants to ensure recovery is possible in case of a complete disaster, with data loss of no more than three days.

Which of the following backup procedures should the technician suggest to BEST meet the customer's needs?

Loading... Loading...
62. Which of the following would MOST likely be connected to a computer Id provide electricity in case of a blackout?

Loading... Loading...
63. A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message.

Which of the following should the technician do FIRST?

Loading... Loading...
64. A remote user has reported a suspicious pop-up. and a technician is troubleshooting the user's laptop. The technician needs to connect securely to the computer to view the user's screen and investigate the issue.

Which of the following should the technician use?

Loading... Loading...
65. Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation.

Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Loading... Loading...
66. Which of the following is the maximum RAM limit of a Windows 32-bit version?

Loading... Loading...
67. A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access.

Which of the following policies is needed?

Loading... Loading...
68. A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings denying the administrators group write and modify access.

Which of the following permissions will the administrators group effectively have? (Select TWO)

Loading... Loading...
69. A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early.

Which of the following is the NEXT step the technician should perform?

Loading... Loading...
70. A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts:

The user profile for Userl5 could not be loaded. Ntuser.dat is missing or corrupt.

Which of the following would be MOST appropriate for resolving this issue?

Page 8 of 33

Loading... Loading...
71. A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

Loading... Loading...
72. An employee reported that a suspicious individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

Loading... Loading...
73. A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory.

Which of the following should the technician use to accomplish this?

Loading... Loading...
74. A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.

Which of the following Control Panel utilities should the technician use to configure the setting?

Loading... Loading...
75. A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.

Which of the following built-in utilities should be used?

Loading... Loading...
76. Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

Loading... Loading...
77. A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained.

Which of the following commands will achieve this result by default?

Loading... Loading...
78. A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.

Which of the following is the FIRST option to check?

Loading... Loading...
79. Which of the following would MOST likely contain troubleshooting guides?

Loading... Loading...
80. A technician accessed a network share from a computer joined to workgroup. The technician logged in as “user1” and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the “user1” account.

Which of the following would allow the technician to log in using the “administrator” username?

Page 9 of 33

Loading... Loading...
81. A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.

Which of the following license type should the technician recommend?

Loading... Loading...
82. An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present.

Which of the following should the administrator do NEXT to mitigate the issue?

Loading... Loading...
83. Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

Loading... Loading...
84. A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal.

Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

Loading... Loading...
85. A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices.

Which of the following should the security administrator recommend? (Choose two.)

Loading... Loading...
86. A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue.

Which of the following should the technician do NEXT?

Loading... Loading...
87. A user is having issues with website access. The user is trying to access a site that is used every day by everyone in the company. When the user goes to the site a message appears stating the site is not secure, and the address bar turns red. A technician contains the site is working fine kw everyone else. The technician verifies the address was entered correctly but when the message shows up. the address is different than what was typed.

Which of the following is causing this issue?

Loading... Loading...
88. A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost.

Which of the following should be considered?

Loading... Loading...
89. Which of the following best practices should a technician observe to reduce the risk of electrical shock?

Loading... Loading...
90. A workstation needs to be hardened against brute force attacks. It also needs to be protected if a user walks away and leaves the computer unlocked.

Which of the following would harden the workstation as required? (Select TWO).

Page 10 of 33

Loading... Loading...
91. A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.

Which of the following is a tool the technician can use to resolve the issue?

Loading... Loading...
92. A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

Loading... Loading...
93. A technician needs to connect securely to a Linux-based network appliance in a remote datacenter.

Which of the following will the technician MOST likely use?

Loading... Loading...
94. A technician is deploying a PXE installation of a new OS onto a small group of company workstations.

Which of the following should the technician monitor during the installation?

Loading... Loading...
95. A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.

Which of the following is MOST likely causing the high resource usage?

Loading... Loading...
96. A user's computer was infected with malware, and a technician successfully removed the infection However, the user reports certain web-based services are still inaccessible.

Which of the following should the technician perform FIRST to resolve the issue?

Loading... Loading...
97. A technician is disposing of computer hardware that contains PHI. The drive must be reusable.

Which of the following methods should be used?

Loading... Loading...
98. A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office.

Which of the following steps should the technician take FIRST?

Loading... Loading...
99. A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour.

Which of the following steps should be performed prior to traveling to prevent further infection? (Select TWO)

Loading... Loading...
100. Which of the following would BEST support an 8TB hard drive with one partition?

Page 11 of 33

Loading... Loading...
101. A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system.

Which of the following would meet this requirement?

Loading... Loading...
102. A technician was contacted regarding an issue affecting hundreds of users on a domain network.

Which of the following would be MOST effective al remediating future issues through documentation?

Loading... Loading...
103. A remotely managed self-checkout machine in a retail store runs Windows 10. The image contains drivers for locally attached third-party hardware (i.e., receipt printers), third-party applications, and proprietary applications made by the company's IT department. The self-checkout machine is experiencing errors, and the store employees are instructed to reload the OS.

Which of the following would be the BEST option to restore full functionality to this machine with the least administrative effort?

Loading... Loading...
104. Which of the following BEST describes the Guest account on a Windows system?

Loading... Loading...
105. Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link.

This email is BEST described as:

Loading... Loading...
106. A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.

Which of the following should the technician do NEXT?

Loading... Loading...
107. CORRECT TEXT

To connect to a secure wireless network, a guest user logs in and is prompted to enter a code that is sent as a text message to the user.

Which of the following types of authentication is this an example?

Loading... Loading...
108. An employee is unable to view in-office network folders while working at home.

Which of the following is the MOST likely cause of the problem?

Loading... Loading...
109. A technician is alerted to a virus on a PC. The technician isolates the PC from the network.

After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

Loading... Loading...
110. Which of the following employs content filtering to prevent data leaks within an organization?

Page 12 of 33

Loading... Loading...
111. A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.

Which of the following best practices could have prevented the attack?

Loading... Loading...
112. An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster.

In addition to the generators and UPS systems, which of the following should the technician recommend testing?

Loading... Loading...
113. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

Loading... Loading...
114. Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

Loading... Loading...
115. An administrator wants to search a file on a Linux server for the plus symbol (+).

Which of the following will the administrator MOST likely use?

Loading... Loading...
116. A company recently upgraded its computers from Windows XP SP3 lo Windows 7. Due to budget constraints, the company was not able to purchase newer machines. The computers do not have TPM chips. Out the company would like to secure the information on the local hard disk in case the hard drive is stolen, while being able to access all of its information even if users leave.

Which of the following would allow the company to accomplish this task?

Loading... Loading...
117. A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection.

Which of the following terminal commands should the technician use?

Loading... Loading...
118. A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall.

To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

Loading... Loading...
119. After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly.

Which of the following should the technician do NEXT?

Loading... Loading...
120. A technician recently built a gaming PC with a multicode CPU, 32GB DDR4 memory, a 1TB SSD. and a high-end GPU. The technician installed the OS and a new game but noticed the frame-rate performance was much lower than expected.

Which of the following should the technician do NEXT to address the performance issues?

Page 13 of 33

Loading... Loading...
121. A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists.

Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

Loading... Loading...
122. A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

Loading... Loading...
123. An office location regularly experiences brownouts.

Which of the following would be the MOST appropriate solution to protect the office computers?

Loading... Loading...
124. A systems administrator is configuring a new workstation.

Which of the following will MOST likely be the administrator's FIRST step?

Loading... Loading...
125. A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD.

The technician logs the following process information:





Based on this data, which of the following is the MOST likely cause of the performance issues?

Loading... Loading...
126. A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.

Which of the following is the most likely NEXT step?

Loading... Loading...
127. An end user reports a Windows computer is infected with a virus.

Which of the following should be the technician’s FIRST troubleshooting step?

Loading... Loading...
128. A technician is cleaning malware on a Windows workstation.

Which of the following would MOST likely prevent a recurrence of the same malware?

Loading... Loading...
129. A technician is recycling PCs to be reused by a middle school.

Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

Loading... Loading...
130. Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.

Which of the following should the technician check NEXT?

Page 14 of 33

Loading... Loading...
131. A network administrator needs to be able to securely connect to a local router from within the office.

Which of the following protocols should the administrator ensure is enabled on the router?

Loading... Loading...
132. A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

Loading... Loading...
133. Which of the following provide the BEST security for a server room? (Select two.)

Loading... Loading...
134. A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors.

Which of the following Is MOST likely the Issue?

Loading... Loading...
135. A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP.

Which of the following would be the NEXT appropriate act?

Loading... Loading...
136. A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.

Which of the following is causing the error?

Loading... Loading...
137. Which of the following Windows versions introduced using applications in the Metro interface?

Loading... Loading...
138. A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

Loading... Loading...
139. A user wants a phone with an operating system that is highly customizable.

Which of the following operating systems will a technician MOST likely recommend?

Loading... Loading...
140. Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks the sent items folder and sees email messages he did not send.

Which of the following would be the BEST way to resolve this issue?

Page 15 of 33

Loading... Loading...
141. Which of the following NTFS security settings overrides all other settings?

Loading... Loading...
142. A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made.

Which of the following solutions would the technician MOST likely recommend? (Select TWO)

Loading... Loading...
143. A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system.

Which of the following did the technician forget to do to prevent reinfection?

Loading... Loading...
144. A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process.

Which of the following should the technician complete NEXT?

Loading... Loading...
145. A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.

Which of the following methods would the technician MOST likely perform on the computer?

Loading... Loading...
146. A customer recently upgraded from Windows 7 to Windows 10. The customer lost access to certain network shares, and the system keeps preventing the user's access.

Which of the following is the MOST likely cause of the issue?

Loading... Loading...
147. Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

Loading... Loading...
148. A user’s mobile device is losing its battery change very quickly. The user report charge at 9:00 a.m. but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is relatively new, high-end phon. The user claims most of the usage involves checking emails for a few minutes three or four times per hours.

Windows of the following should a technician perform FIRST to diagnose the issue properly?

Loading... Loading...
149. A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page. The technician tries with a third-party browser and connects without error. The technician needs to make sure the old certificate is no longer used in Internet Explorer.

Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

Loading... Loading...
150. Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

Page 16 of 33

Loading... Loading...
151. Which of the following is a community supported, open source OS used for both services and workstations?

Loading... Loading...
152. To which of the following should a technician ground an ESD strap when adding memory to a workstation?

Loading... Loading...
153. A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software.

Which of the following would be MOST important during this phase of the request process?

Loading... Loading...
154. A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

Loading... Loading...
155. A contract technician is working on a network printer when a print job starts and completes.

The technician notices it is a spreadsheet that appears to be an annual salary report.

Which of the following actions should the technician take?

Loading... Loading...
156. Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together.

Which of the following should the technician perform FIRST?

Loading... Loading...
157. Which of the following devices provides protection against brownouts?

Loading... Loading...
158. What a user is allowed to do on a computer network would be addressed in:

Loading... Loading...
159. Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

Loading... Loading...
160. Which of the following is an authentication protocol that can be used for users in the field?

Page 17 of 33

Loading... Loading...
161. A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.

Which of the following upgrade methods should the technician use?

Loading... Loading...
162. A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory,.

Which of the following should the technician use to accomplish this?

Loading... Loading...
163. Users have reported their files have disappeared, and they are unable to access local data. The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing.

Which of the following has MOST likely occurred?

Loading... Loading...
164. Joe, a user. is unable to log into a laptop using his proper network credentials because of an incorrect username or password However. Joe is able to log in without issue to a coworker's PC using his credentials.

Which of the following is the MOST likely cause of the issue?

Loading... Loading...
165. CORRECT TEXT

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.

You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D

Please repair this failure without overwriting the customers’ local user profiles.



INSTRUCTIONS

Use the Windows recovery and repair utilities to remediate the issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.















Loading... Loading...
166. A technician notices a Windows computer is running slowly. The computer boots up slowly and has long delays when executing large files. The technician runs Disk Cleanup, but the problem persists.

Which of the following will MOST likely help speed up the computer?

Loading... Loading...
167. Which of the following types of scripts would be seen on the user end of a web page?

Loading... Loading...
168. A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs.

Which of the following should the technician implement to ensure maximum uptime of the client VM?

Loading... Loading...
169. A technician has set up a new computer for a customer and needs to add a login with administrative privileges.

Which of the following tools should the technician use?

Loading... Loading...
170. Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

Page 18 of 33

Loading... Loading...
171. Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

Loading... Loading...
172. A user has changed the MAC address of a laptop to gain access to a network.

This is an instance of:

Loading... Loading...
173. The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen.

Which of the following BEST describes this email?

Loading... Loading...
174. Which of the following key and mouse combinations can be used to run an application as a different user?

Loading... Loading...
175. A user is unable to get to any internal websites but can access some external websites.

Which of the following will MOST likely resolve this issue?

Loading... Loading...
176. A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening.

Which of the following commands should the technician use?

Loading... Loading...
177. Company policy states that users must secure their laptops before leaving the office for the evening.

Which of the following physical security measures should be used?

Loading... Loading...
178. A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

Loading... Loading...
179. Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.

Which of the following security measures should be used?

Loading... Loading...
180. A wireless access point is going to be configured in a small office located in a crowded building.

Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

Page 19 of 33

Loading... Loading...
181. A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.

Which of the following actions should the user take FIRST?

Loading... Loading...
182. A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected.

Which of the following is the BEST method for the technician to use to scan the boot sector?

Loading... Loading...
183. A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.

Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

Loading... Loading...
184. A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.

Which of the following should the technician do to remove the threat from the system?

Loading... Loading...
185. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

Loading... Loading...
186. A technician is in the process of removing a recently discovered Trojan horse application from a users laptop.

Which of the following should the technician complete to prevent reinfection of the same machine?

Loading... Loading...
187. An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work.

Which of the following is the BEST solution for the technician to recommend?

Loading... Loading...
188. Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?

Loading... Loading...
189. A company is upgrading the desktops of all its employees. Users in the multimedia department would like to keep the RAM from their current desktops to upgrade their new devices.

Following change management best practices, which of the following actions should a technician perform NEXT?

Loading... Loading...
190. A technician is troubleshooting a computer that may have some corrupt operating system files.

Which of the following command line tools should the technician use to check these files?

Page 20 of 33

Loading... Loading...
191. A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance.

Which of the following should the help desk team recommend the user do in this situation?

Loading... Loading...
192. Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it.

Which of the following should Joe check NEXT to troubleshoot the issue?

Loading... Loading...
193. Which of the following would BEST support an 8TB hard drive with one partition?

Loading... Loading...
194. A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem.

Which of the following should the technician do FIRST?

Loading... Loading...
195. A technician is troubleshooting a network connectivity issue on a Linux workstation.

Which of the following commands would help the technician gain information about the network settings on the machine?

Loading... Loading...
196. Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch.

Which of the following must Ann do to allow FTP communications?

Loading... Loading...
197. Which of the following standards controls the processing of credit cards?

Loading... Loading...
198. A technician is in the process of removing a recently discovered Trojan horse application from a users laptop.

Which of the following should the technician complete to prevent reinfection of the same machine?

Loading... Loading...
199. When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues. The network administrator notices abnormally high network utilization.

Which of the following is the MOST likely issue the company is experiencing?

Loading... Loading...
200. A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained.

Which of the following commands will achieve this result by default?

Page 21 of 33

Loading... Loading...
201. Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage.

Which of the following is MOST likely causing the wireless issues?

Loading... Loading...
202. A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks.

Which of the following best practices would a technician MOST likely implement as pari of the security template? (Select TWO).

Loading... Loading...
203. A technician wants to write a script that will check data line by line until the end of the file.

Which of the following elements will perform the check?

Loading... Loading...
204. A user spills a small amount of toner from a laser printer onto the floor.

Which of the following is the safest way to clean up the toner?

Loading... Loading...
205. A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible.

Which of the following technologies should the technician use to manage this system?

Loading... Loading...
206. During a network server outage, the administrators computer received an IP address of 169.254.0.10 and had no access to internal or external resources.

Which of the following should be configured to ensure the administrator's computer retains network access?

Loading... Loading...
207. After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users.

Which of the following is the BEST way for the technician to perform this security feature?

Loading... Loading...
208. A user recently connected a Windows laptop to a free WiFi hot-spot. After returning to the office, the user cannot access network shares.

Which of the following is the MOST likely cause?

Loading... Loading...
209. A workstation needs to be hardened against brute force attacks. It also needs to be protected if a user walks away and leaves the computer unlocked.

Which of the following would harden the workstation as required? (Select TWO).

Loading... Loading...
210. A company is implementing multifactor authentication and requires a solution that utilizes TCP.

Which of the following will the company MOST likely select?

Page 22 of 33

Loading... Loading...
211. A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files.

Which of the following settings should the user change to resolve the issue?

Loading... Loading...
212. Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

Loading... Loading...
213. Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?

Loading... Loading...
214. A technician is alerted to a virus on a PC. The technician isolates the PC from the network.

After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

Loading... Loading...
215. Which of the following Windows versions introduced using applications in the Metro interface?

Loading... Loading...
216. A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside.

Which of the following should the technician use to remove the excess dust and dirt?

Loading... Loading...
217. Which of the following OS installation types would a technician use for multiple workstations at the same time?

Loading... Loading...
218. A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts:

The user profile for Userl5 could not be loaded. Ntuser.dat is missing or corrupt.

Which of the following would be MOST appropriate for resolving this issue?

Loading... Loading...
219. A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device.

Which of the following should the technician perform NEXT? (Select TWO)

Loading... Loading...
220. A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play.

Which of the following is MOST likely causing the Issue?

Page 23 of 33

Loading... Loading...
221. A technician is securing a server room by implementing a two-factor authentication solution.

Which of the following should the technician implement to provide the BEST security for the server room?

Loading... Loading...
222. A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page The technician tries with a third-party browser and connects without error The technician needs to make sure the old certificate is no longer used in Internet Explorer.

Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

Loading... Loading...
223. A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory.".

Which of the following commands would BEST accomplish this?

Loading... Loading...
224. While installing a hard drive in a server, the administrator installs an extra physical hard disk.

Which of the following technologies will allow the administrator to extend an existing volume onto the extra disk?

Loading... Loading...
225. A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet.

Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

Loading... Loading...
226. A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level.

Which of the following should the technician configure?

Loading... Loading...
227. A systems administrator is configuring a new workstation.

Which of the following will MOST likely be the administrator's FIRST step?

Loading... Loading...
228. A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made.

Which of the following solutions would the technician MOST likely recommend? (Select TWO)

Loading... Loading...
229. A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen.

Which of the following should the technician instruct the user to do FIRST?

Loading... Loading...
230. Which of the following attack types exploits vulnerabilities in human nature?

Page 24 of 33

Loading... Loading...
231. Which of the following installation methods allows a technician to install Windows from a remote location

Loading... Loading...
232. After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly.

Which of the following should the technician do NEXT?

Loading... Loading...
233. Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

Loading... Loading...
234. A user is unable to open a document on a shared drive from a Linux workstation.

Which of the following commands would help the user gain access to the document?

Loading... Loading...
235. When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Loading... Loading...
236. When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a

Loading... Loading...
237. A technician needs to connect to a server using a secure terminal application. The technician must be able to reboot the server quickly and restart all the daemons with this application.

Which of the following methods will the technician MOST likely use? (Select TWO)

Loading... Loading...
238. A user's PC has been running slowly. The user says there have been no changes to the PC.

Which of the following tools should the technician use to troubleshoot the cause of the speed reduction?

Loading... Loading...
239. A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar.

To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

Loading... Loading...
240. A customer Is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it.

Which of the following settings is a solution to the issue?

Page 25 of 33

Loading... Loading...
241. An end user submits a request for the IT specialist to install new software on a workstation.

The workstation has the following specifications.





The minimum software requirements for the new application are a dual-core. 64-btt OS with 4GB of RAM and 60GB storage.

Which of the following conditions will the technician encounter when attempting to install the software?

Loading... Loading...
242. A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software.

Which of the following would be MOST important during this phase of the request process?

Loading... Loading...
243. A technician scans a computer for malware, and it comes back clean each time However, the user still sees suspicious activity from the computer.

Which of the following should the technician check for NEXT?

Loading... Loading...
244. A security learn recommends a disaster recovery plan with the following requirements:

* Recent backups should be readily available.

* Only long-term backups should be stored off premises

* There should be minimum expenditure on hardware.

Which of the following satisfies all of these requirements?

Loading... Loading...
245. Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks the sent items folder and sees email messages he did not send.

Which of the following would be the BEST way to resolve this issue?

Loading... Loading...
246. Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

Loading... Loading...
247. A user moves a file from one NTFS disk to another NTFS disk.

Which of the following descnbes the changes to the file permissions?

Loading... Loading...
248. A customer is shopping for a new tablet. The customer is primarily concerned about transferring applications from the old tablet to the new one.

Which of the following specifications is MOST important when selecting a new tablet?

Loading... Loading...
249. A technician Is troubleshooting network connectivity and receives the following output:





Which of the following tools is the technician MOST likely using? (Select TWO)

Loading... Loading...
250. Which of the following should be done prior to installing replacement RAM modules into a desktop computer?

Page 26 of 33

Loading... Loading...
251. A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system.

Which of the following would meet this requirement?

Loading... Loading...
252. Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites.

Which of the following should the technician suggest NEXT to try to fix the issue?

Loading... Loading...
253. A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early.

Which of the following is the NEXT step the technician should perform?

Loading... Loading...
254. A healthcare institute has asked the IT department to help protect medical and financial data.

Which of the following regulations is the healthcare provider MOST concerned about' (Select TWO)?

Loading... Loading...
255. An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster.

In addition to the generators and UPS systems, which of the following should the technician recommend testing?

Loading... Loading...
256. An administrator needs to uninstall an update on a Windows 7 computer.

Which of the following Control Panel utilities would make this possible?

Loading... Loading...
257. A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user.

Which of the following will support this task''

Loading... Loading...
258. A technician performs a risk assessment and determines a requested change has low risk and low impact.

Which of the following best practices should the technician follow to proceed with implementing the change?

Loading... Loading...
259. SIMULATION

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.



INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.



Loading... Loading...
260. A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message.

Which of the following should the technician do FIRST?

Page 27 of 33

Loading... Loading...
261. A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

Loading... Loading...
262. An administrator is setting up a Windows terminal server.

Which of the following settings should the administrator modify to increase server security? (Select two.)

Loading... Loading...
263. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

Loading... Loading...
264. A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

Loading... Loading...
265. A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

Loading... Loading...
266. Which of the following provide the BEST security for a server room? (Select two.)

Loading... Loading...
267. Which of the following threats uses personalized information in an attempt at obtaining information?

Loading... Loading...
268. A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.

Which of the following needs to be adjusted on the workstation to fix the issue?

Loading... Loading...
269. A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.

Which of the following Control Panel utilities should the technician use to configure the setting?

Loading... Loading...
270. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

Page 28 of 33

Loading... Loading...
271. A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.

Which of the following is the BEST choice for the technician to make?

Loading... Loading...
272. A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable.

Which of the following is the BEST method of securing the phone?

Loading... Loading...
273. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

Loading... Loading...
274. A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

Loading... Loading...
275. A technician is installing a private PC in a public workspace.

Which of the following password practices should the technician implement on the PC to secure network access?

Loading... Loading...
276. Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.

Joe has verified he is connected to the Internet.

Which of the following would explain why Joe cannot access his personal shares?

Loading... Loading...
277. A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop.

Which of the following should a technician do to resolve the issue and avoid recurrence?

Loading... Loading...
278. A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor.

Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

Loading... Loading...
279. Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

Loading... Loading...
280. Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Page 29 of 33

Loading... Loading...
281. A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

Loading... Loading...
282. A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.

Which of the following license type should the technician recommend?

Loading... Loading...
283. Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.

Which of the following can Joe do to ensure the backups will work if needed?

Loading... Loading...
284. A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.

Which of the following recommendations should the contractor give to the customer? (Select two.)

Loading... Loading...
285. A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.

Which of the following is the FIRST option to check?

Loading... Loading...
286. A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.

Which of the following Control Panel utilities should the technician use?

Loading... Loading...
287. A technician has identified malware on a user’s system.

Which of the following should the technician do NEXT according to malware removal best practices?

Loading... Loading...
288. A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.

Which of the following is a tool the technician can use to resolve the issue?

Loading... Loading...
289. A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions.

Which of the following should a technician recommend?

Loading... Loading...
290. Which of the following installation types would require the use of an answer file to install the OS?

Page 30 of 33

Loading... Loading...
291. A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.

Which of the following built-in utilities should be used?

Loading... Loading...
292. A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

Loading... Loading...
293. A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem.

Which of the following should the technician do NEXT?

Loading... Loading...
294. A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares.

Which of the following are the MOST likely reasons for these issues? (Select two.)

Loading... Loading...
295. With which of the following types is a man-in-the-middle attack associated?

Loading... Loading...
296. An employee reported that a suspicious individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

Loading... Loading...
297. A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping.

The remote connection drops periodically.

Which of the following steps should the technician take NEXT to resolve the problem?

Loading... Loading...
298. An employee is unable to view in-office network folders while working at home.

Which of the following is the MOST likely cause of the problem?

Loading... Loading...
299. A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.

Which of the following documents did the network administrator MOST likely give to the technician?

Loading... Loading...
300. After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.

When testing the policy, a removable drive is plugged in but can still be accessed.

Which of the following command-line tools should the technician use to apply the new policy?

Page 31 of 33

Loading... Loading...
301. A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.

With which of the following types of infections are the PCs MOST likely infected? (Select two.)

Loading... Loading...
302. Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.

Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.

Which of the following settings or features is responsible for the problems Ann is experiencing?

Loading... Loading...
303. Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

Loading... Loading...
304. In which of the following file extension types would a user expect to see the command. “net use T: serverfiles’?

Loading... Loading...
305. A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.

Which of the following should the technician replace to prevent these issues in the future?

Loading... Loading...
306. Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Loading... Loading...
307. Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized.

Which of the following messages will be displayed?

Loading... Loading...
308. Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure.

Which of the following should the help desk perform to fix the issue?

Loading... Loading...
309. A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.

Which of the following would the project team MOST likely add to the SOW?

Loading... Loading...
310. A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

Page 32 of 33

Loading... Loading...
311. An end user’s PC is taking a long time to boot.

Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

Loading... Loading...
312. A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.

Which of the following protocols and authentication methods should the technician implement? (Select two.)

Loading... Loading...
313. A technician is PXE booting a computer.

Which of the following is the technician MOST likely performing on the computer?

Loading... Loading...
314. Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.

Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

Loading... Loading...
315. Which of the following is the maximum RAM limit of a Windows 32-bit version?

Loading... Loading...
316. A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.

Which of the following steps should be taken FIRST to determine the cause of the issue?

Loading... Loading...
317. Joe, an end user, has been prompted to provide his username and password to access the payroll system.

Which of the following authentication methods is being requested?

Loading... Loading...
318. Which of the following devices provides protection against brownouts?

Loading... Loading...
319. Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.

She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance.

Which of the following is the MOST likely issue Ann is experiencing?

Loading... Loading...
320. A junior Linux system administrator needs to update system software.

Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

Page 33 of 33

Loading... Loading...
321. A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.

If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

Loading... Loading...
322. A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

Loading... Loading...
323. A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective.

A technician inspects the device and see the following:





Which of the following should be changed to resolve this issue?

Loading... Loading...
324. A Windows user is attempting to install a local printer and is unsuccessful on permissions.

Which of the following user types BEST describes this user?

Loading... Loading...
325. An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet.

Which of the following actions should the user take?

Loading... Loading...
326. A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network.

Which of the following boot methods initiates such an upgrade?

Loading... Loading...

 

Exit mobile version