1102 Q's 50 Flashcards

1
Q
  1. Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the
    following is the best way to remove the malware?
    A. Run System Restore.
    B. Place in recovery mode.
    C. Schedule a scan.
    D. Restart the PC
A

The correct answer is C. Schedule a scan.

Explanation:
C. Schedule a scan: Running a malware scan with an antivirus or anti-malware program is the best
course of action to remove malware from the device. This will help detect and remove any
malicious software that may have been installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. When visiting a particular website, a user receives a message stating, “Your connection is not
    private”. Which of the following describes this
    issue?
    A. Certificate warning
    B. Malware
    C. JavaScript error
    D. Missing OS update
A

The correct answer is A. Certificate warning.

Explanation:
A. Certificate warning: This message indicates that there is a problem with the website’s SSL
certificate. SSL certificates are used to establish secure connections between a web server and a
browser. When a browser encounters an issue with the certificate, such as it being expired, invalid,
or issued by an untrusted authority, it displays a warning message to the user indicating that the
connection is not private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. An organization is creating guidelines for the incorporation of generative AI solutions. In which of
    the following would these guidelines be
    published?
    A. Standard operating procedure
    B. Acceptable use policy
    C. Security protocols
    D. Data flow diagram
A

The correct answer is B. Acceptable use policy.

Explanation:
B. Acceptable use policy: Guidelines for the incorporation of generative AI solutions, which outline
how employees are permitted to use such technology within the organization, would typically be
included in the organization’s acceptable use policy. This policy governs the proper and acceptable
use of technology resources within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is also known as something you know, something you have, and
something you are?
A. ACL
B. MFA
C. SMS
D. NFC

A

The correct answer is B. MFA (Multi-Factor Authentication).

Explanation:
B. MFA (Multi-Factor Authentication): Multi-Factor Authentication (MFA) involves using multiple
factors to verify a user’s identity. These factors typically include:
- Something you know (such as a password or PIN)
- Something you have (such as a physical token or a mobile device)
- Something you are (such as biometric data like fingerprints or facial recognition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician wants to update the local security policies on a Windows machine but is unable to
launch the expected snap-in. Which of the
following is the most likely reason?
A. The computer is running Windows Home.
B. The user did not sign the end user license agreement.
C. The user disabled the User Account Control.
D. An antivirus application is blocking access.
The correct answer is A. The computer is running Windows Home.

A

Explanation:
A. The computer is running Windows Home: Windows Home editions have certain limitations
compared to Windows Pro or Enterprise editions, one of which is the ability to access and modify
local security policies. Windows Home editions do not include the Local Security Policy Editor
snap-in, which is typically available in Windows Pro or Enterprise editions. Therefore, if the
technician is using a Windows Home edition, they would be unable to launch the expected snap-in
to update local security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the Windows OS that only recognizes 4GB of RAM?
A. The Home version OS
B. The 32-bit OS
C. The 64-bit OS
D. The trial version OS

A

The correct answer is:

B. The 32-bit OS

Reasoning:

32-bit OS (Correct Answer): A 32-bit version of a Windows operating system can only address up to
4GB of RAM due to its architectural limitations. This means that regardless of the total amount of
RAM installed in the system, a 32-bit OS can only use up to 4GB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The calendar application on an employee’s smartphone is experiencing frequent crashes, and
the smartphone has become unresponsive. Which of the following should a technician do first to
resolve the issue?
A. Reinstall the application on the smartphone.
B. Update the smartphone’s OS.
C. Reset the smartphone to factory settings.
D. Reboot the smartphone.

A

The correct answer is:

D. Reboot the smartphone.

Reasoning:

Reboot the smartphone (Correct Answer): Rebooting the smartphone is the first step to take when
troubleshooting a crashing application and unresponsiveness. This action can resolve temporary
glitches and free up system resources that might be causing the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A SOHO wireless router needs to be configured so incoming traffic is only allowed on specified
    ports. Which of the following is the best way for the technician to accomplish this task?
    A. Physically secure access to the router.
    B. Implement AES encryption.
    C. Install the latest firmware.
    D. Disable Universal Plug and Play.
A

The correct answer is:

D. Disable Universal Plug and Play.

Reasoning:

Disabling Universal Plug and Play (UPnP) is the best way to ensure that only specified ports are
open for incoming traffic. UPnP can automatically open ports on the router for various applications,
which can lead to security vulnerabilities by allowing unintended traffic through. By disabling UPnP,
the technician ensures that ports can only be opened manually, thereby restricting incoming traffic
to only those ports explicitly configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is troubleshooting a smartphone that is unable to download and install the latest
OS update. The technician notices the device operates more slowly than expected, even after
rebooting and closing all applications. Which of the following should the technician check next?
A. Application permissions
B. Available storage space
C. Battery charge level
D. Wi-Fi connection speed

A

The correct answer is:

B. Available storage space

Reasoning:

Available storage space (Correct Answer): If a smartphone is unable to download and install an OS
update, and is operating slowly, insufficient available storage space is a likely cause. OS updates
require a significant amount of free storage to download and install. Additionally, lack of storage
can impact overall device performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following describes a concept that requires using a combination of an ID, a
password, and a biometric?
A. Types of security
B. Access control
C. Principle of least privilege
D. Multifactor authentication

A

The correct answer is:

D. Multifactor authentication

Reasoning:

Multifactor authentication (Correct Answer): This concept requires the use of more than one
method of authentication from different categories of credentials. For example, an ID and password
(something you know) combined with a biometric factor (something you are) constitute multifactor
authentication. This enhances security by requiring multiple forms of verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician needs to track evidence for a forensic investigation on a Windows computer.
Which of the following describes this process?
A. Valid license
B. Data retention requirements
C. Material safety data sheet
D. Chain of custody

A

The correct answer is:

D. Chain of custody

Reasoning:

Chain of custody (Correct Answer): This term refers to the process of documenting the handling of
evidence from the time it is collected until it is presented in court. This documentation ensures that
the evidence has not been tampered with and maintains its integrity throughout the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed
software product, but the user does not want to pay for a license. Which of the following license
types should the technician recommend?
A. Corporate
B. Open-source
C. Personal
D. Enterprise

A

The correct answer is:

B. Open-source

Reasoning:

Open-source (Correct Answer): Open-source software is distributed with a license that allows
users to access and modify the source code freely. Many open-source antivirus solutions are
available for free, making them suitable for users who do not want to pay for a license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following operating systems uses the ext4 filesystem type?
A. macOS
B. iOS
C. Linux
D. Windows

A

The correct answer is:

C. Linux

Reasoning:

Linux (Correct Answer): The ext4 filesystem type is commonly used in Linux operating systems. Ext4
is the fourth extended filesystem, a widely used filesystem type in Linux distributions due to its
robustness, scalability, and support for large file sizes and volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is used to prevent automobiles from crashing into a building?
A. Cameras
B. Bollard
C. Lighting
D. Biometrics

A

The correct answer is:

B. Bollard

Reasoning:

Bollard (Correct Answer): A bollard is a short vertical post typically used to control or direct road
traffic, including preventing vehicles from crashing into buildings or pedestrian areas. Bollards act
as physical barriers and are often installed in front of buildings or along sidewalks to protect against
accidental collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is following the ticketing system’s best practices when handling user support
requests. Which of the following should the technician do first when responding to a user support
request that contains insufficient information?
A. Ask the user for clarification.
B. Keep the user updated on the progress.
C. Document the root cause.
D. Follow the system’s escalation process.

A

The correct answer is:

A. Ask the user for clarification.

Reasoning:

Ask the user for clarification (Correct Answer): When a user support request contains insufficient
information, the first step for the technician should be to ask the user for clarification. This helps
ensure that the technician understands the issue properly before proceeding with troubleshooting
or resolution steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A customer is configuring on an old desktop an inexpensive file server to share photos and
videos and wants to avoid complicated licensing.
Which of the following operating systems should the technician most likely recommend?
A. Chrome OS
B. Linux
C. macOS
D. Windows

A

The correct answer is:

B. Linux

Reasoning:

Linux (Correct Answer): Linux operating systems are often recommended for inexpensive file
servers due to their open-source nature, which typically means no licensing fees. Additionally,
Linux distributions offer various server-oriented features and are well-suited for file sharing
purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should
be used to input the SSID and password?
A. Network & Internet
B. System
C. Personalization
D. Accounts

A

The correct answer is:

A. Network & Internet

Reasoning:

Network & Internet (Correct Answer): This setting in Windows 10 is where users can manage
network connections, including Wi-Fi networks. Within Network & Internet settings, there is an
option to view and connect to available Wi-Fi networks, where the SSID (network name) and
password can be inputted during the setup process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user recently downloaded a free game application on an Android device. The device then
began crashing frequently and quickly losing its battery charge. Which of the following should the
technician recommend be done first to remediate these issues? (Choose two.)
A. Uninstall the game application.
B. Perform a factory reset of the device.
C. Connect the device to an external charger.
D. Install the latest security patches.
E. Clear the application’s cache.
F. Enable the device’s built-in anti-malware protection.

A

The correct answers are A and D.

Explanation:

A. Uninstall the game application: The first step in troubleshooting the issues described would be to
remove the likely culprit, which is the recently downloaded game application. Often, applications
downloaded from untrusted sources or poorly coded applications can cause device instability and
battery drain. Uninstalling the application should resolve or at least mitigate the issues.

D. Install the latest security patches: Security patches are essential updates provided by the device
manufacturer or operating system developer to fix vulnerabilities and improve the overall security of
the device. Installing the latest security patches ensures that the device is protected against known
security threats that could potentially exploit vulnerabilities in the system, leading to crashes or
battery drain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following authentication methods should be used for BYOD wireless devices?
A. Local certificates
B. TACACS+
C. RADIUS
D. Captive portal

A

The correct answer is C. RADIUS.

Explanation:

C. RADIUS (Remote Authentication Dial-In User Service): RADIUS is a widely used authentication
protocol that provides centralized authentication, authorization, and accounting (AAA)
management for users who connect and use a network service. It is commonly used in enterprise
environments to authenticate users and devices accessing network resources, including wireless
networks. RADIUS supports a variety of authentication methods, including username/password,
digital certificates, and token-based authentication, making it suitable for BYOD (Bring Your Own
Device) environments where users bring their own devices with different authentication
requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following Linux commands would help to identify which directory the user is
currently operating in?
A. pwd
B. dig
C. find
D. cat

A

The correct answer is A. pwd.

Explanation:

A. pwd (Print Working Directory): This command displays the full pathname of the current working
directory. It helps users identify their current location within the directory structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is the most likely reason a filtration system is critical for data centers?
A. Plastics degrade over time.
B. High humidity levels can rust metal.
C. Insects can invade the data center.
D. Dust particles can clog the machines.

A

The correct answer is D. Dust particles can clog the machines.

Explanation:

Dust particles pose a significant threat to the proper functioning of data center equipment. As data
center equipment, such as servers and networking devices, operate continuously, they draw in air
for cooling purposes. Dust particles present in the air can accumulate over time and clog the
components, including fans, heat sinks, and air vents, leading to reduced airflow and increased
operating temperatures. This can result in overheating, reduced performance, and ultimately,
hardware failure. Therefore, a filtration system is critical in data centers to remove dust particles
from the incoming air, ensuring proper airflow and preventing equipment damage.

22
Q

A technician is creating a location on a Windows workstation for a customer to store meeting
minutes. Which of the following commands should the technician use?
A. c:\minutes
B. dir
C. rmdir
D. md

A

The correct answer is D. md.

Explanation:

D. md (Make Directory): This command is used to create a new directory (folder) in a specified
location on a Windows system. In this scenario, the technician wants to create a location
(directory) for storing meeting minutes, so they would use the md command followed by the
desired directory name.

23
Q

A company using Active Directory wants to change the location of all users’ “Documents” to a
file server on the network. Which of the following should the company set up to accomplish this
task?
A. Security groups
B. Folder redirection
C. Organizational unit structure
D. Access control list

A

The correct answer is B. Folder redirection.

Explanation:

B. Folder redirection: Folder redirection is a feature in Active Directory that allows administrators to
redirect certain folders, such as “Documents,” “Desktop,” “Downloads,” etc., from users’ local
profiles to network locations. By configuring folder redirection, the company can ensure that users’
“Documents” folders are stored on a file server on the network rather than on their individual
computers. This facilitates centralized management, data backup, and access control.

24
Q

Which of the following operating systems would most likely be used to run the inventory
management system at a factory?
A. Windows
B. Chrome OS
C. Android
D. iOS

A

Correct Answer:
A. Windows

Explanation:
Windows operating systems, such as Windows Server or Windows 10/11 Enterprise editions, are
commonly used in business environments, including factories, for running enterprise applications
like inventory management systems. Windows offers robust features, compatibility with a wide
range of software, and extensive support for networking and security, making it well-suited for
business use cases.

25
Q

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of
the following prerequisites must be in place before the technician can start the installation
process?
A. Internet connection
B. Product key
C. Sufficient storage space
D. UEFI firmware

A

Correct Answer:
C. Sufficient storage space

Explanation:
Before performing a bare-metal installation of the Windows 10 operating system, the technician
must ensure that there is sufficient storage space available on the target drive to accommodate the
installation files and the operating system itself. Without adequate storage space, the installation
process cannot proceed.

26
Q

A technician has been unable to remediate a persistent malware infection on a user’s
workstation. After the technician reinstalled the OS, the
malware infection returned later that day. Which of the following is the most likely source?
A. Trojan
B. Boot sector virus
C. Spyware
D. Rootkit

A

Correct Answer:
B. Boot sector virus

Explanation:
A boot sector virus infects the master boot record (MBR) or the boot sector of a storage device,
such as a hard drive or SSD. Even after reinstalling the operating system, if the boot sector remains
infected, the malware can persist and re-infect the system during the boot process, leading to the
recurrence of the malware infection later that day.

27
Q

A technician is troubleshooting a PC because the user has reported strange pop-up windows
and computer performance issues. Which of the following actions should the technician take next?
A. Isolate the machine from the network.
B. Scan the system for hidden files.
C. Disable unused ports.
D. Install antivirus software.
E. Reconfigure the firewall.

A

Correct Answer: A. Isolate the machine from the network.

Explanation: When troubleshooting a PC experiencing strange pop-up windows and performance
issues, the first step should be to isolate the machine from the network. This helps prevent
potential further spread of any malware or malicious activity to other devices on the network.
Isolating the machine also allows the technician to perform diagnostics and remediation without
external interference.

28
Q

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and
a new copy of Windows were recently installed on the PC. Which of the following is the most
appropriate command to use to fix the issue?
A. msconfig
B. chkdsk
C. sfc
D. diskpart
E. mstsc

A

Correct Answer: C. sfc

Explanation: The System File Checker (sfc) command is used to scan and restore corrupted system
files in Windows. Since the PC is unable to start the graphical user interface (GUI), there may be

corrupted system files causing the issue. Running the sfc command can help identify and repair
these corrupted files, potentially resolving the problem.

29
Q

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications
that can work both on a 32-bit and a 64-bit system.
The legacy system is critically important to the organization. The IT manager cautions that the new
applications must not have a detrimental
effect on company finances. Which of the following impacts is the IT manager most concerned
with?
A. Device
B. Business
C. Network
D. Operation

A

Correct Answer: B. Business

Explanation: The IT manager’s primary concern is likely the impact on the organization’s finances,
which directly relates to the business aspect. Upgrading a legacy system with new applications can
incur costs related to software licensing, hardware upgrades (if necessary), training for employees,
potential downtime during the transition, and ongoing support and maintenance expenses.
Therefore, the IT manager wants to ensure that the upgrade does not have a detrimental effect on
company finances, as any negative impact could potentially harm the organization’s bottom line.

30
Q

Which of the following should be documented to ensure that the change management plan is
followed?
A. Scope of the change
B. Purpose of the change
C. Change rollback plan
D. Change risk analysis

A

Correct Answer: A. Scope of the change

Explanation: Documenting the scope of the change is essential to ensure that the change
management plan is followed effectively. The scope defines what is included in the change and
what is not, providing clarity and guidance to everyone involved in the change process. It outlines
the boundaries of the change, including which systems, processes, or components are affected
and to what extent. By documenting the scope, stakeholders can understand the objectives of the
change and ensure that the appropriate actions are taken to implement it correctly.

31
Q

A technician is on site dealing with an angry customer. The customer thinks the issues have not
been addressed, while the technician thinks that the issue has been correctly resolved. Which of
the following should the technician do to best handle the situation?
A. Insist that the customer is correct and document the concern.
B. Listen to the customer and do not speak at all.
C. Escalate the issue to the next tier.
D. Apologize and ask what would help resolve the issue.

A

Correct Answer: D. Apologize and ask what would help resolve the issue.

Explanation: When dealing with an angry customer who believes the issues have not been
addressed despite the technician’s belief that they have, it’s crucial to approach the situation with
empathy and a willingness to understand the customer’s perspective. Apologizing for any
frustration or inconvenience experienced by the customer shows empathy and helps de-escalate
the situation. Asking the customer what would help resolve the issue demonstrates a proactive
approach to finding a solution that meets the customer’s needs and expectations.

32
Q

A user reports that a new, personally owned tablet will not connect to the corporate Wi-Fi
network. The user is able to connect to the Wi-Fi network with other devices, and the tablet is
running the latest software. Which of the following is the most likely cause of the issue?
A. Incorrect encryption settings
B. Blocked MAC address
C. Outdated drivers
D. Disabled location services

A

Correct Answer: A. Incorrect encryption settings

Explanation: The most likely cause of the issue is incorrect encryption settings on the tablet.
Corporate Wi-Fi networks often have specific security settings, such as encryption protocols (e.g.,
WPA2-PSK), authentication methods (e.g., WPA2-Enterprise), and network passphrases or keys. If
the tablet’s encryption settings do not match those configured on the corporate Wi-Fi network, it
will be unable to connect. Since the user can connect other devices to the Wi-Fi network, this
suggests that the network is functioning correctly, and the issue lies with the tablet’s configuration.

33
Q

A user is trying to limit the amount of time their children spend on the internet. Which of the
following Windows 10 settings should be enabled to accomplish this objective?
A. Family Options
B. Update & Security
C. Ease of Access
D. Network & Internet
E. Privacy

A

Correct Answer: A. Family Options

Explanation: To limit the amount of time children spend on the internet in Windows 10, the Family
Options feature should be enabled. Family Options allow parents to set up parental controls,
including screen time limits, app and game restrictions, content filters, and activity reports. By
configuring Family Options, parents can manage and monitor their children’s online activities and
ensure they spend an appropriate amount of time on the internet.

34
Q

A company recently experienced a security incident in which a USB drive containing malicious
software was able to covertly install malware on a
workstation. Which of the following actions should be taken to prevent this incident from
happening again? (Choose two.)
A. Install a host-based IDS.
B. Restrict log-ln times.
C. Enable a BIOS password.
D. Update the password complexity.
E. Disable AutoRun.
F. Restrict user permissions.

A

The correct answers are E and F. Let’s break down why:

E. Disable AutoRun: This is a critical step in preventing malware from automatically executing when
a USB drive is inserted into a workstation. By disabling AutoRun, the system won’t automatically run programs from removable drives, thus reducing the risk of malware infections spreading via USB
drives.

F. Restrict user permissions: Limiting the permissions of users can help prevent unauthorized
access to system resources and reduce the impact of malware infections. By restricting user
permissions, users will have fewer opportunities to execute malicious software and perform
actions that could compromise system security.

35
Q
  1. A technician is troubleshooting a Windows system that is having issues with the OS loading at
    startup. Which of the following should the technician do to diagnose the issue?
    A. Enable boot logging on the system.
    B. Launch the last known-good configuration.
    C. Check the system resource usage in Task Manager.
    D. Run the sfc /scannow command.
    E. Use the Event Viewer to open the application log.
A

The correct answer is A. Enable boot logging on the system.

Here’s why:

A. Enable boot logging on the system: Boot logging records the startup process and can help
identify the point at which the operating system is encountering issues during boot. By enabling
boot logging, the technician can review the log file to pinpoint any errors or abnormalities that
occur during startup, which can aid in diagnosing the issue.

36
Q

A payroll server has data on it that needs to be readily available and can be recovered quickly if
something is accidentally removed. Which of the following backup methods should be used to
provide the fastest data recovery in this situation?
A. Full
B. Differential
C. Synthetic
D. Incremental

A

The correct answer is A. Full backup.

Here’s the rationale:

A. Full backup: A full backup involves copying all data from the source to the backup storage. In the
event of data loss or accidental removal, restoring from a full backup provides the fastest recovery
since all data is readily available in a single backup set. This method ensures that the server can be
restored to its original state quickly and efficiently.

37
Q

A user’s work PC has been the target of multiple phishing attacks. Which of the following is a
way for the user to prevent further attacks?
A. Enabling Windows Firewall
B. Activating the email spam filter
C. Using a secure VPN connection
D. Running vulnerability scans on a schedule

A

The correct answer is B. Activating the email spam filter.

Here’s why:

B. Activating the email spam filter: Phishing attacks often target users through email, attempting to
trick them into revealing sensitive information or downloading malicious content. By activating an
email spam filter, the user can reduce the likelihood of receiving phishing emails in their inbox.
Spam filters analyze incoming emails and filter out messages that exhibit characteristics
commonly associated with phishing attempts, such as suspicious links or attachments. This can
significantly reduce the user’s exposure to phishing attacks.

38
Q

A technician is setting up a printer on a Linux workstation. Which of the following commands
should the technician use to set the default printer?
A. lpr
B. lspool
C. lpstat
D. lpoptions

A

The correct answer is D. lpoptions.

Here’s why:

D. lpoptions: The lpoptions command in Linux is used to set or display printer options and defaults.
Among its functionalities, it allows the technician to specify the default printer to use. This
command provides flexibility in managing printer settings and configuring the default printer for a
Linux workstation.

39
Q

Which of the following statements describes the purpose of scripting languages?
A. To access the hardware of the computer it is running on
B. To automate tasks and reduce the amount of manual labor
C. To abstract the complexity of the computer system
D. To compile the program into an executable file

A

The correct answer is B. To automate tasks and reduce the amount of manual labor.

Here’s why:

B. To automate tasks and reduce the amount of manual labor: Scripting languages are designed to
facilitate automation by allowing users to write scripts or programs that can perform repetitive
tasks automatically. These tasks can range from simple file operations to complex system
administration tasks. By using scripting languages, users can streamline workflows, increase
efficiency, and reduce the need for manual intervention.

40
Q

When a user attempts to open an email using a company-issued smartphone, the user receives
a message stating the email is encrypted and cannot be opened. The user forwards the email to a
personal account and receives the same message. The user then contacts the IT department for
assistance. The technician instructs the user to contact the sender to exchange information in
order to decode the message.
Which of the following will the user receive from the sender?
A. Keys
B. Token
C. Password
D. Root CA

A

The correct answer is A. Keys.

Here’s why:

A. Keys: In the context of encrypted emails, the sender typically uses encryption keys to protect the
content of the email. These keys are necessary to decrypt the email and make its contents
readable. When the user contacts the sender to exchange information to decode the message, they
will likely receive the encryption keys needed to decrypt the email.

41
Q

Which of the following ports should be opened to allow for DNS recursion?
A. 1
B. 53
C. 80
D. 123
E. 445

A

The correct answer is B. 53.

Here’s why:

B. 53: DNS (Domain Name System) operates on both UDP and TCP port 53. DNS recursion is a
process where a DNS server queries other DNS servers on behalf of a client to fully resolve a DNS
query. To allow DNS recursion, port 53 needs to be open to allow DNS queries and responses to
pass through.

42
Q

A technician is building a new desktop machine for a user who will be using the workstation to
render 3-D promotional movies. Which of the following is the most important component?

A. Dedicated GPU
B. DDR5 SODIMM
C. NVMe disk
D. 64-bit CPU

A

The most important component for rendering 3-D promotional movies is A. Dedicated GPU.

Here’s why:

A. Dedicated GPU: Rendering 3-D graphics, especially for movies, is highly dependent on the
graphical processing power. A dedicated GPU (Graphics Processing Unit) is designed specifically
for handling graphics-intensive tasks like rendering. It accelerates the rendering process by
offloading complex calculations from the CPU, resulting in faster rendering times and smoother
performance. For tasks like 3-D rendering, a powerful GPU with a large number of CUDA cores or
similar architecture is crucial for optimal performance.

43
Q

A technician needs to strengthen security controls against brute-force attacks. Which of the
following options best meets this requirement?

A. Multifactor authentication
B. Encryption
C. Increased password complexity
D. Secure password vault

A

The correct answer is:

A. Multifactor authentication

Explanation:
Multifactor authentication (MFA) enhances security by requiring users to provide multiple forms of
verification before gaining access to a system or account. This could involve something the user
knows (such as a password), something the user has (such as a smartphone or token), or
something the user is (such as a fingerprint or facial recognition). By requiring multiple factors for
authentication, MFA significantly increases the difficulty for attackers to gain unauthorized access
through brute-force attacks. Even if an attacker manages to guess or crack a password, they would
still need the additional factor(s) to successfully authenticate.

44
Q

A user is experiencing the following issues with Bluetooth on a smartphone:
* The user cannot hear any sound from a speaker paired with the smartphone.
* The user is having issues synchronizing data from their smart watch, which is also connected via
Bluetooth.
A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and
adjusted the volume levels, but still could not hear anything. Which of the following steps should
the technician take next to troubleshoot the Bluetooth issues?
A. Restart the smartphone.
B. Reset the network settings.
C. Unpair the Bluetooth speaker.
D. Check for system updates.

A

The correct answer is:

A. Restart the smartphone.

Explanation:

Restarting the smartphone is a common troubleshooting step that can resolve many software-
related issues, including Bluetooth connectivity problems. By restarting the device, it clears

temporary system glitches and resets various components, potentially resolving the Bluetooth
issues. This step is appropriate because the technician has already confirmed that the Bluetooth
settings are correct and the device is paired with the speaker.

45
Q

A user identified that a program installed in a workstation does not have optional features
enabled. Which of the following must the technician do to install the optional features?
A. Go to Programs and Features, uninstall the program, and reinstall it.
B. Go to Administrative Tools and edit System Configuration.
C. Go to Administrative Tools and run Disk Cleanup.
D. Go to Programs and Features, select the program, and click on Change.

A

The correct answer is:

D. Go to Programs and Features, select the program, and click on Change.

Explanation:
In Windows operating systems, to install optional features of a program, the technician should go to
“Programs and Features” in the Control Panel, select the desired program, and then click on the
“Change” button. This will open the program’s installation wizard, where the technician can modify
the installation to include the optional features.

46
Q

Which of the following operating systems is most commonly used in embedded systems?
A. Chrome OS
B. macOS
C. Windows
D. Linux

A

The correct answer is:

D. Linux

Explanation:
Linux is the most commonly used operating system in embedded systems due to its flexibility,
customizability, and open-source nature. It provides developers with a wide range of tools and
resources to tailor the operating system to the specific requirements of embedded devices. Linux is
widely adopted in various industries for embedded applications, including consumer electronics,
automotive, industrial automation, and IoT devices.

47
Q

A technician cannot uninstall a system driver because the driver is currently in use. Which of the
following tools should the technician use to help uninstall the driver?
A. msinfo32.exe
B. dxdiag.exe
C. msconfig.exe
D. regedit.exe

A

The correct answer is:

C. msconfig.exe

Explanation:
The “System Configuration” tool (msconfig.exe) in Windows allows users to manage system startup,
including disabling drivers from loading during boot. By disabling the driver from loading at startup,
the technician can prevent it from being in use, thus enabling the uninstallation of the driver. After

disabling the driver using msconfig.exe, the technician can restart the computer and then proceed
to uninstall the driver normally.

48
Q

An administrator configured security features on company-owned mobile devices to help
protect against data loss. Which of the following is the best way to protect data on a misplaced
device?
A. Remote wipe
B. Device encryption
C. PIN codes
D. Locator applications

A

The best way to protect data on a misplaced device is through device encryption, making option B
the correct answer. Here’s why:

B. Device encryption: This option involves encrypting the data stored on the device, ensuring that
even if the device falls into unauthorized hands, the data remains inaccessible without the

encryption key. This is an effective method for protecting data on a misplaced device because it
prevents unauthorized access to the data, maintaining its confidentiality.

49
Q

A company is creating an access control system that uses something you have and something
you are. Which of the following will be required for
user authentication? (Choose two.)
A. Password manager
B. Encryption keys
C. Biometric scanner
D. Smartcard reader
E. Host-based IDS
F. PIN code

A

The correct answers are:

C. Biometric scanner
D. Smartcard reader

Explanation:

In an access control system that uses “something you have” and “something you are” for user
authentication, the “something you have” is typically a smartcard or a similar device, which
requires a smartcard reader to authenticate the user. The “something you are” refers to biometric
characteristics, which are typically scanned and verified using a biometric scanner. Therefore,
options C and D are correct.The correct answers are:

C. Biometric scanner
D. Smartcard reader

Explanation:

In an access control system that uses “something you have” and “something you are” for user
authentication, the “something you have” is typically a smartcard or a similar device, which
requires a smartcard reader to authenticate the user. The “something you are” refers to biometric
characteristics, which are typically scanned and verified using a biometric scanner. Therefore,
options C and D are correct.

50
Q

A customer installed a new web browser from an unsolicited USB drive that the customer
received in the mail. The browser is not working as
expected, and internet searches are redirected to another site. Which of the following should the
user do next after uninstalling the browser?
A. Delete the browser cookies and history.
B. Reset all browser settings.
C. Change the browser default search engine.
D. Install a trusted browser.

A

Correct Answer: D. Install a trusted browser.

Explanation: Installing a trusted browser is the best course of action after uninstalling the
problematic one. Unsolicited USB drives can contain malicious software, and installing a browser
from such a source can lead to security issues and unexpected behavior. By installing a trusted
browser from a reputable source, the customer can mitigate the risk of encountering similar issues
in the future.