Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

220-1102 Sample Questions Answers

Questions 4

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Buy Now
Questions 5

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?

Options:

A.

format

B.

netstat

C.

diskpart

D.

net use

E.

rmdir

Buy Now
Questions 6

Which of the following commands should a technician use to change user permissions?

Options:

A.

sudo

B.

chxod

C.

xv

D.

pwd

Buy Now
Questions 7

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

Options:

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Buy Now
Questions 8

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

Options:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Buy Now
Questions 9

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Options:

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Buy Now
Questions 10

A workstation's hard drive is making loud noises, applications are running slowly, and the workstation is rebooting unexpectedly. Which of the following should the technician do first to begin troubleshooting the issue?

Options:

A.

Perform a System Restore.

B.

Open Disk Cleanup.

C.

Replace the hard drive.

D.

Run CHKDSK.

Buy Now
Questions 11

A customer is explaining issues with a workstation to a technician. While the customer is listing the issues, the technician is browsing social media on a smartphone. Which of the following professionalism and communication techniques should the technician be using in this situation? (Select two).

Options:

A.

Follow up with the customer.

B.

Avoid personal interruptions.

C.

Provide proper documentation.

D.

Clarify customer statements.

E.

Actively listen and take notes.

F.

Maintain professional attire.

Buy Now
Questions 12

A user sent a large amount of money to a supplier's bank account and claims that the Chief Executive Officer instructed the user to do so. A technician informs the user that the request was fraudulent and contacts the authorities. Which of the following types of attack took place?

Options:

A.

Spoofing

B.

Phishing

C.

Whaling attack

D.

Insider threat

Buy Now
Questions 13

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

Options:

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

Buy Now
Questions 14

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Buy Now
Questions 15

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

Options:

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Buy Now
Questions 16

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Buy Now
Questions 17

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

Buy Now
Questions 18

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Buy Now
Questions 19

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

Options:

A.

Registry Editor

B.

Task Manager

C.

Event Viewer

D.

Local Users and Groups

Buy Now
Questions 20

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

Options:

A.

System Configuration

B.

Task Manager

C.

Performance Monitor

D.

Group Policy Editor

Buy Now
Questions 21

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

Options:

A.

High availability

B.

Regionally diverse backups

C.

On-site backups

D.

Incremental backups

Buy Now
Questions 22

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

Options:

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Buy Now
Questions 23

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

Options:

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Buy Now
Questions 24

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

Options:

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

Buy Now
Questions 25

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

Options:

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Buy Now
Questions 26

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

Options:

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Buy Now
Questions 27

A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

Options:

A.

certmgr.msc

B.

msconfig.exe

C.

lusrmgr.msc

D.

perfmon.msc

Buy Now
Questions 28

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Buy Now
Questions 29

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

Options:

A.

Implementing data-at-rest encryption

B.

Disabling AutoRun

C.

Restricting user permissions

D.

Restricting log-in times

E.

Enabling a screen lock

F.

Disabling local administrator accounts

Buy Now
Questions 30

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

Options:

A.

RADIUS

B.

AES

C.

EAP-EKE

D.

MFA

Buy Now
Questions 31

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

Options:

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Buy Now
Questions 32

A technician needs to ensure that USB devices are not suspended by the operating system Which of the following Control Panel utilities should the technician use to configure the setting?

Options:

A.

System

B.

Power Options

C.

Devices and Printers

D.

Ease of Access

Buy Now
Questions 33

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

Options:

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Buy Now
Questions 34

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

Options:

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

Buy Now
Questions 35

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Buy Now
Questions 36

A company wants to ensure employees are using strong passwords. Which of the following should the company use to enforce password security?

Options:

A.

Complexity requirement

B.

Security questions

C.

Account lockout policy

D.

Expiration policy

E.

Two-factor authentication

Buy Now
Questions 37

Which of the following should be enabled on a mobile device to prevent unauthorized access to data in case the device is lost or stolen? (Select two).

Options:

A.

Biometric authentication

B.

Remote wipe

C.

Encryption

D.

Device tracking

E.

Antivirus software

F.

VPN access

Buy Now
Questions 38

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Buy Now
Questions 39

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

Options:

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Buy Now
Questions 40

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

Buy Now
Questions 41

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

Options:

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

Buy Now
Questions 42

A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?

Options:

A.

eventvwr.msc

B.

perfmon.msc

C.

gpedic.msc

D.

devmgmt.msc

Buy Now
Questions 43

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Buy Now
Questions 44

A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs. Which of the following should the technician do to proceed with the upgrade? (Select two).

Options:

A.

Unplug the extra hardware.

B.

Delete unnecessary files.

C.

Update the driver software.

D.

Restore the system files.

E.

Uninstall unused desktop applications.

F.

Add additional memory.

Buy Now
Questions 45

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

Options:

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Buy Now
Questions 46

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Buy Now
Questions 47

A systems administrator receives notification about unauthorized access to company resources outside normal business hours. Which of the following security measures should the systems administrator implement to prevent further unauthorized use?

Options:

A.

Perimeter firewalls

B.

SSL-enabled DNS

C.

Anonymizing VPNs

D.

Multifactor authentication

Buy Now
Questions 48

When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best explains this issue?

Options:

A.

Exceeded the data usage limit

B.

Sluggish response time

C.

Degraded network service

D.

High network traffic

Buy Now
Questions 49

Which of the following should be considered when maintaining the environment of a server room?

Options:

A.

Circuit breaker capacity

B.

Power distribution unit placement

C.

RAID configurations

D.

Virtualization

Buy Now
Questions 50

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Buy Now
Questions 51

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Options:

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Buy Now
Questions 52

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Options:

A.

Restart the mobile device.

B.

Turn on airplane mode.

C.

Check that the accessory is ready to pair.

D.

Clear all devices from the phone's Bluetooth settings.

Buy Now
Questions 53

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

Options:

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Buy Now
Questions 54

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Buy Now
Questions 55

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

Options:

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Buy Now
Questions 56

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Buy Now
Questions 57

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

Options:

A.

fdisk

B.

Diskpart

C.

Disk Utility

D.

FileVault

Buy Now
Questions 58

Which of the following operating systems is considered closed source?

Options:

A.

Ubuntu

B.

Android

C.

CentOS

D.

OSX

Buy Now
Questions 59

Which of the following filesystem types does macOS use?

Options:

A.

ext4

B.

exFAT

C.

NTFS

D.

APFS

Buy Now
Questions 60

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Options:

A.

Verify the DNS server settings.

B.

Turn off the Windows firewall.

C.

Confirm the subnet mask is correct.

D.

Configure a static IP address.

Buy Now
Questions 61

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

Options:

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Buy Now
Questions 62

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

Options:

A.

Biometrics

B.

Soft token

C.

Access control lists

D.

Smart card

Buy Now
Questions 63

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Options:

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Buy Now
Questions 64

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 65

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

Options:

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Buy Now
Questions 66

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

Options:

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Buy Now
Questions 67

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

Options:

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Buy Now
Questions 68

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Buy Now
Questions 69

Which of the following best describes a rollback plan?

Options:

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Buy Now
Questions 70

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

Options:

A.

NAT

B.

WPA3

C.

802.1X

D.

Static IP

Buy Now
Questions 71

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Buy Now
Questions 72

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Buy Now
Questions 73

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Buy Now
Questions 74

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Buy Now
Questions 75

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Buy Now
Questions 76

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Buy Now
Questions 77

A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?

Options:

A.

Family Options

B.

Update & Security

C.

Ease of Access

D.

Network & Internet

E.

Privacy

Buy Now
Questions 78

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

Options:

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Buy Now
Questions 79

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Buy Now
Questions 80

Which of the following operating systems was the app file type designed to run under as an application file bundle?

Options:

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Buy Now
Questions 81

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

Options:

A.

Authenticator application

B.

Access control lists

C.

Biometrics

D.

Smart card readers

Buy Now
Questions 82

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

Options:

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Buy Now
Questions 83

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

Options:

A.

ipr

B.

Ispool

C.

Ipstat

D.

Ipoptions

Buy Now
Questions 84

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

Options:

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Buy Now
Questions 85

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Buy Now
Questions 86

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Buy Now
Questions 87

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 88

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

Options:

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Buy Now
Questions 89

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

Options:

A.

1

B.

53

C.

80

D.

123

E.

445

Buy Now
Questions 90

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Buy Now
Questions 91

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Options:

Buy Now
Questions 92

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings

B.

Implementing expiration policies

C.

Defining complexity requirements

D.

Updating antivirus definitions

Buy Now
Questions 93

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Options:

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Buy Now
Questions 94

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

Options:

A.

Ask the user for clarification.

B.

Keep the user updated on the progress.

C.

Document the root cause.

D.

Follow the system’s escalation process.

Buy Now
Questions 95

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

Options:

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Buy Now
Questions 96

Which of the following features can be used to ensure a user can access multiple versions of files?

Options:

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Buy Now
Questions 97

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Buy Now
Questions 98

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

Options:

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Buy Now
Questions 99

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

Options:

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Buy Now
Questions 100

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

Options:

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Buy Now
Questions 101

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

Options:

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Buy Now
Questions 102

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Buy Now
Questions 103

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Buy Now
Questions 104

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

Options:

A.

System time

B.

IP address

C.

DNS servers

D.

Windows updates

Buy Now
Questions 105

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Buy Now
Questions 106

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

Options:

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

Buy Now
Questions 107

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Options:

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Buy Now
Questions 108

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Options:

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Buy Now
Questions 109

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

Buy Now
Questions 110

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Buy Now
Questions 111

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

Options:

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Buy Now
Questions 112

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Buy Now
Questions 113

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Options:

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Buy Now
Questions 114

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Buy Now
Questions 115

Which of the following is MOST likely contained in an EULA?

Options:

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Buy Now
Questions 116

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

Options:

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Buy Now
Questions 117

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

Options:

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Buy Now
Questions 118

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Buy Now
Questions 119

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

Options:

A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Buy Now
Questions 120

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

Options:

A.

Run the virus scanner in an administrative mode.

B.

Reinstall the operating system.

C.

Reboot the system in safe mode and rescan.

D.

Manually delete the infected files.

Buy Now
Questions 121

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Options:

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

Buy Now
Questions 122

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

Options:

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Buy Now
Questions 123

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Options:

A.

Network and Sharing Center

B.

Programs and Features

C.

Default Apps

D.

Add or Remove Programs

Buy Now
Questions 124

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

Options:

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Buy Now
Questions 125

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

    Index number of the Event Viewer issue

    First command to resolve the issue

    Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Options:

Buy Now
Questions 126

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

Buy Now
Questions 127

Which of the following is the STRONGEST wireless configuration?

Options:

A.

WPS

B.

WPA3

C.

WEP

D.

WMN

Buy Now
Questions 128

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

Options:

A.

Send a quick message regarding the delay to the next customer.

B.

Cut the current customer's lime short and rush to the next customer.

C.

Apologize to the next customer when arriving late.

D.

Arrive late to the next meeting without acknowledging the lime.

Buy Now
Questions 129

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

Options:

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Buy Now
Questions 130

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

Options:

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

Buy Now
Questions 131

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Buy Now
Questions 132

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Buy Now
Questions 133

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

Options:

A.

Disable the SSID broadcast.

B.

Disable encryption settings.

C.

Disable DHCP reservations.

D.

Disable logging.

Buy Now
Questions 134

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Buy Now
Questions 135

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Buy Now
Questions 136

A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the best solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never.

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never.

C.

Within the Power Options of the Control Panel utility, select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never.

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged In category to Do Nothing.

Buy Now
Questions 137

A technician thinks that a computer on the network has been infected with malware. The technician attempts several times to use a malware removal tool, but the issue persists. Which of the following should the technician do next?

Options:

A.

Restore the computer from the last known-good backup

B.

Reboot the computer into safe mode

C.

Purchase a new endpoint protection tool

D.

Use system recovery to prevent further infection

Buy Now
Questions 138

While accessing a website, a user clicks on a menu option and nothing happens. Which of the following actions should the user take to most likely resolve this issue?

Options:

A.

Enable TLS 1.0 in the browser.

B.

Enable private-browsing mode.

C.

Disable pop-up blocker.

D.

Clear the cache.

Buy Now
Questions 139

Which of the following is the most secure screen lock?

Options:

A.

Face

B.

Swipe

C.

Password

D.

Fingerprint

Buy Now
Questions 140

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

Options:

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Buy Now
Questions 141

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

Options:

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Buy Now
Questions 142

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

Options:

A.

Reinstall the OS.

B.

Run the System Restore feature.

C.

Disconnect the PC from the network.

D.

Pay the amount demanded.

E.

Scan the PC with an anti-malware program.

Buy Now
Questions 143

Which of the following commands should be used to display current processor activity on a Linux workstation?

Options:

A.

top

B.

ls

C.

procmon

D.

taskmgr

Buy Now
Questions 144

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

Options:

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

Buy Now
Questions 145

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

Options:

A.

The application must be purchased by the company.

B.

The smartphone is not on the latest OS version.

C.

The smartphone is not enrolled in MDM service.

D.

The application fails to install and launch.

Buy Now
Questions 146

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Options:

A.

Shut down the infected computer and swap it with another computer

B.

Investigate what the interface is and what triggered it to pop up

C.

Proceed with initiating a full scan and removal of the viruses using the presented interface

D.

Call the phone number displayed in the interface of the antivirus removal tool

Buy Now
Questions 147

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

Options:

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Buy Now
Questions 148

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Options:

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Buy Now
Questions 149

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Buy Now
Questions 150

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?

Options:

A.

PIN

B.

Username and password

C.

SSO

D.

Fingerprint

Buy Now
Questions 151

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

Options:

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Buy Now
Questions 152

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

Options:

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

Buy Now
Questions 153

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Buy Now
Questions 154

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Options:

A.

Pretexting

B.

Spoofing

C.

Vishing

D.

Scareware

Buy Now
Questions 155

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

Options:

A.

Services

B.

Processes

C.

Performance

D.

Startup

Buy Now
Questions 156

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

Options:

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Buy Now
Questions 157

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Options:

A.

Application updates

B.

Anti-malware software

C.

OS reinstallation

D.

File restore

Buy Now
Questions 158

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Buy Now
Questions 159

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Buy Now
Questions 160

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Buy Now
Questions 161

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Options:

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Buy Now
Questions 162

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

Options:

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Buy Now
Questions 163

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

Options:

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Buy Now
Questions 164

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Buy Now
Questions 165

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

Options:

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Buy Now
Questions 166

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Buy Now
Questions 167

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

Options:

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Buy Now
Questions 168

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

Options:

A.

Changing the office's Wi-Fi SSID and password

B.

Performing a remote wipe on the device

C.

Changing the user's password

D.

Enabling remote drive encryption

Buy Now
Questions 169

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

Options:

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Buy Now
Questions 170

Which of the following defines the extent of a change?

Options:

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Buy Now
Questions 171

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Options:

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Buy Now
Questions 172

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

Options:

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Buy Now
Questions 173

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

Options:

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Buy Now
Questions 174

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

Options:

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Buy Now
Questions 175

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

Options:

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Buy Now
Questions 176

Which of the following macOS features provides the user with a high-level view of all open windows?

Options:

A.

Mission Control

B.

Finder

C.

Multiple Desktops

D.

Spotlight

Buy Now
Questions 177

Which of the following is used to explain issues that may occur during a change implementation?

Options:

A.

Scope change

B.

End-user acceptance

C.

Risk analysis

D.

Rollback plan

Buy Now
Questions 178

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

Buy Now
Questions 179

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

Options:

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Buy Now
Questions 180

A hard drive that previously contained PII needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

Options:

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

Buy Now
Questions 181

A technician needs to join a Windows client to a domain. Which of the following is required?

Options:

A.

Local access

B.

Internet connection

C.

Enterprise administrative permissions

D.

Computer MAC address

Buy Now
Questions 182

Which of the following is protected by government policy for end-user information?

Options:

A.

DRM

B.

EULA

C.

PCI

D.

PII

Buy Now
Questions 183

While testing a new computer, a technician hears a loud buzzing sound, smells smoke, and sees a flame inside the power supply. Which of the following actions should the technician take first?

Options:

A.

Extinguish the fire with water.

B.

Smother the fire by replacing the system case.

C.

Turn off the power supply switch.

D.

Disconnect the power cord from the wall outlet.

Buy Now
Questions 184

Which of the following filesystems supports journaling?

Options:

A.

NTFS

B.

exFAT

C.

HFS

D.

ext2

Buy Now
Questions 185

Which of the following will automatically map network drives based on Group Policy configuration?

Options:

A.

Log-in scripts

B.

Access controllists

C.

Organizationalunits

D.

Folder redirection

Buy Now
Questions 186

A technician is on-site dealing with an angry customer. The customer thinks the issues have not been addressed, while the technician thinks that the issue has been correctly resolved. Which of the following should the technician do to handle the situation?

Options:

A.

Insist that the customer is correct and document the concern.

B.

Listen to the customer and do not speak at all.

C.

Escalate the issue to the next tier.

D.

Apologize and ask what would help resolve the issue.

Buy Now
Questions 187

A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?

Options:

A.

Using an agent-based cloud backup solution

B.

Implementing a grandfather-father-son backup rotation

C.

Automating backups to a local network share

D.

Saving files manually to an external drive

Buy Now
Questions 188

A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

Options:

A.

Ask the company's human resources department to address the issue.

B.

Notify the project manager about the user's concern.

C.

Tell the user that this request is not on the list to be upgraded.

D.

Ask the user's supervisor if the technician should upgrade the computer.

Buy Now
Questions 189

A customer's workstation cannot connect to the internet. A technician runs a command on the workstation to view the network settings. The following is a partial readout of the response:

Which of the following is the most likely cause of the issue?

Options:

A.

The IP address is incorrect.

B.

The subnet mask is incorrect.

C.

The gateway setting is incorrect.

D.

The DNS servers are incorrect.

E.

The physical address is spoofed.

Buy Now
Questions 190

A client’s device was recently used by multiple other users. The client reports their device is now running slower than usual. Which of the following steps should a technician take first? (Select two.)

Options:

A.

Perform a virus scan

B.

Check the startup programs

C.

Back up the data

D.

Disable the guest account

E.

Update the firmware

F.

Reinstall the operating system

Buy Now
Questions 191

A company has experienced a ransomware attack. Which of the following is the best way to recover from ransomware?

Options:

A.

Antivirus

B.

Backups

C.

Anti-malware

D.

Recovery mode

Buy Now
Questions 192

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Buy Now
Questions 193

A technician needs to configure a computer for a user to work from home so the user can still securely access the user's shared files and corporate email. Which of the following tools would best accomplish this task?

Options:

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Buy Now
Questions 194

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

Options:

A.

Owners can be notified a change is being made and can monitor it for performance impact. Most Voted

B.

A risk assessment can be performed to determine if the software is needed.

C.

End users can be aware of the scope of the change.

D.

A rollback plan can be implemented in case the software breaks an application.

Buy Now
Questions 195

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Options:

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Buy Now
Questions 196

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Buy Now
Questions 197

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Buy Now
Questions 198

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Buy Now
Questions 199

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Options:

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Buy Now
Questions 200

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

Options:

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Buy Now
Questions 201

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Which of the following should be done NEXT?

Options:

A.

Educate the user on the solution that was performed.

B.

Tell the user to take time to fix it themselves next time.

C.

Close the ticket out.

D.

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Buy Now
Questions 202

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Buy Now
Questions 203

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Options:

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Buy Now
Questions 204

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

Options:

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Buy Now
Questions 205

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Buy Now
Questions 206

Which of the following Linux commands would be used to install an application?

Options:

A.

yum

B.

grep

C.

Is

D.

sudo

Buy Now
Questions 207

Which of the following could be used to implement secure physical access to a data center?

Options:

A.

Geofence

B.

Alarm system

C.

Badge reader

D.

Motion sensor

Buy Now
Questions 208

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Questions 209

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

Options:

A.

set AirDrop so that transfers are only accepted from known contacts

B.

completely disable all wireless systems during the flight

C.

discontinue using iMessage and only use secure communication applications

D.

only allow messages and calls from saved contacts

Buy Now
Questions 210

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Buy Now
Questions 211

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Options:

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Buy Now
Questions 212

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?

Options:

A.

DHCP reservation

B.

Port forwarding

C.

DNS A record

D.

NAT

Buy Now
Questions 213

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

Options:

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Buy Now
Questions 214

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Options:

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Buy Now
Questions 215

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Buy Now
Questions 216

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Buy Now
Questions 217

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

Options:

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Buy Now
Questions 218

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

    Static entry

Options:

A.

ARP table

B.

APIPA address

C.

NTP specification

Buy Now
Questions 219

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

Options:

A.

Startup

B.

Performance

C.

Application history

D.

Processes

Buy Now
Questions 220

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Buy Now
Questions 221

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

    msconfig

Options:

A.

chkdsk

B.

sfc

C.

diskpart

D.

mstsc

Buy Now
Questions 222

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

Options:

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Buy Now
Questions 223

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

Options:

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Buy Now
Questions 224

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Buy Now
Questions 225

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

Options:

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Buy Now
Questions 226

A user's company phone was stolen. Which of the following should a technician do next?

Options:

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

Buy Now
Questions 227

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

Options:

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Buy Now
Questions 228

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Options:

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Buy Now
Questions 229

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

Options:

A.

DHCP

B.

Firewall

C.

SSD

Buy Now
Questions 230

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

Options:

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Buy Now
Questions 231

A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).

Options:

A.

USB

B.

PXE

C.

Optical media

D.

Partition

E.

Boot record

F.

SMB

Buy Now
Questions 232

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Buy Now
Questions 233

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

Options:

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Buy Now
Questions 234

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

Options:

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Buy Now
Questions 235

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

Options:

A.

1

B.

53

C.

110

D.

445

Buy Now
Questions 236

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Buy Now
Questions 237

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

Options:

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Buy Now
Questions 238

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

Options:

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Buy Now
Questions 239

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

Options:

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Buy Now
Questions 240

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

Options:

A.

Reimage the system and install SSL.

B.

Install Trusted Root Certificate.

C.

Select View Certificates and then Install Certificate.

D.

Continue to access the website.

Buy Now
Questions 241

Which of the following would allow physical access to a restricted area while maintaining a record of events?

Options:

A.

Hard token

B.

Access control vestibule

C.

Key fob

D.

Door Lock

Buy Now
Questions 242

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Buy Now
Questions 243

Which of the following is also known as something you know, something you have, and something you are?

    ACL

Options:

A.

MFA

B.

SMS

C.

NFC

Buy Now
Questions 244

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

Options:

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Buy Now
Questions 245

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

Options:

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

Buy Now
Questions 246

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Buy Now
Questions 247

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Buy Now
Questions 248

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Buy Now
Questions 249

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

Options:

A.

Group Policy

B.

Browser extension

C.

System Configuration

D.

Task Scheduler

Buy Now
Questions 250

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Buy Now
Questions 251

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Buy Now
Questions 252

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

Options:

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

Buy Now
Questions 253

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

Options:

A.

Full

B.

Incremental

C.

Differential

D.

Synthetic

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Nov 30, 2025
Questions: 845
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 220-1102