1102 Q's Second 56 Flashcards

1
Q

A client wants a technician to set up a proxy server in a branch office to manage
internet access. This involves configuring the workstations to use the new proxy
server. Which of the following Internet Options tabs in Control Panel would be most
appropriate for the technician to use to configure the settings?
A. Privacy
B. Advanced
C. Content
D. Connections
E. Security

A

Correct Answer:
D. Connections

Explanation:
To configure a proxy server in Windows, use the “Connections” tab in Internet
Options. This tab includes the LAN settings where proxy server details can be
entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician needs to perform after-hours service starting at 10:00 p.m. The
technician is currently 20 minutes late. The customer will also be late. Which of the
following should the technician do considering proper communication techniques
and professionalism?
A. Do not notify the customer if arriving before the customer.
B. Dismiss the customer and proceed with the after-hours work.
C. Contact the customer if the technician is arriving late.
D. Disclose the experience via social media

A

C. Contact the customer if the technician is arriving late.

Explanation:
Proper communication and professionalism require informing the customer about
any delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware is installed on a device after a user clicks on a link in a suspicious email.
Which of the following is the best way to remove the malware?
A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC.

A

Correct Answer:
C. Schedule a scan

Explanation:
Running a scan with antivirus or antimalware software is the best way to remove
malware from a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When visiting a particular website, a user receives a message stating, “Your
connection is not private”. Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update

A

Correct Answer:
a. Certificate warning
Explanation:
When a user receives a message stating “Your connection is not private,” it typically
indicates a problem with the SSL/TLS certificate of the website. This warning alerts
users that the website’s certificate is invalid, expired, or not issued by a trusted
certificate authority, potentially compromising the security of the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization is creating guidelines for the incorporation of generative AI
solutions. In which of the following would these guidelines be published?
A. Standard operating procedure
B. Acceptable use policy
C. Security protocols
D. Data flow diagram

A

Correct Answer:
B. Acceptable use policy

Explanation:
Guidelines for incorporating generative AI solutions would be published in the
organization’s Acceptable Use Policy, which outlines acceptable and unacceptable
technology use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is also known as something you know, something you have,
and something you are?
A. ACL
B. MFA
C. SMS
D. NFC

A

Correct Answer:
B. MFA
Explanation:
MFA involves “something you know” (like a password), “something you have” (like a
token or smartphone), and “something you are” (like biometric data). It enhances
security by requiring multiple forms of verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician wants to update the local security policies on a Windows machine but
is unable to launch the expected snap-in. Which of the following is the most likely
reason?
A. The computer is running Windows Home.
B. The user did not sign the end user license agreement.
C. The user disabled the User Account Control.
D. An antivirus application is blocking access.

A

Correct Answer:
A. The computer is running Windows Home.
Explanation:
Windows Home editions do not include the Local Security Policy Editor (secpol.msc),
which is used to update local security policies. This feature is only available in
Windows Professional, Enterprise, and Education editions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician needs to back up a small business’s entire network that includes ten
workstations. Which of the following methods should the technician use to safely
and securely back up the business’s network?
A. Cloud storage
B. RAID
C. Tape drive
D. Local backups

A

Correct Answer:
A. Cloud Storage
Explanation:
Cloud storage offers secure, off-site backup with accessibility from anywhere,
providing redundancy and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Applications on a computer are not updating, which is preventing the user from
opening certain files. Which of the following MAC snap-ins should the technician
launch next to continue troubleshooting the issue?
A. gpedit.msc
B. perfmon.msc
C. devmgmt.msc
D. eventvwr.msc

A

Correct Answer:
D. eventvwr.msc

Explanation:
Event Viewer (eventvwr.msc) allows technicians to check the system logs for errors
related to application updates and other system events. This can help identify why
the applications are not updating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user is unable to start a computer following a failed Windows 10 update. When
trying to start the computer, the user sees a blue screen of death. Which of the
following steps should a technician take to diagnose the issue?
A. Perform a safe mode boot.
B. Run the System Restore wizard.
C. Start the computer in the last known-good configuration.
D. Reset the BIOS settings.

A

Correct Answer:
A. Perform a safe mode boot.
Explanation:
Booting into Safe Mode allows the computer to start with a minimal set of drivers
and services, which can help diagnose and potentially fix issues caused by a failed
update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician is manually updating Windows workstations. Each workstation is
currently running Windows Pro in a workgroup environment. Which of the following
changes can the technician make to create a more manageable environment?

A. Downgrade all workstations from the Pro version to the Home version of the OS.
B. Upgrade all workstations from the Pro version to Pro for Workstations.
C. Create a domain and join the workstations to the domain for management
purposes.
D. Make sure all workstations are operating under the same workgroup name.

A

Correct Answer:
c.Create a domain
Explanation:
Joining workstations to a domain allows centralized management, making it easier
to handle updates, policies, and user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following authentication types is the most secure?
A. WPA3
B. WEP
C. RADIUS
D. TACACS+
E. WPS

A

Correct Answer:
A. WPA3
Explanation:
WPA3 (Wi-Fi Protected Access 3) is the latest and most secure wireless
authentication protocol, offering enhanced security features compared to older
protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user reports being unable to access a sports team’s website on an office
computer. The administrator tells the user this blocked access is intentional and
based on company guidelines. Which of the following is the administrator referring
to?
A. NDA
B. AUP
C. VPN
D. SOP

A

Correct Answer:
B. AUP
Explanation:
An Acceptable Use Policy (AUP) outlines the rules and guidelines for using the
organization’s network and resources. It often includes restrictions on accessing
certain types of websites, such as sports sites, to ensure appropriate use of
company resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user’s laptop has been performing slowly and redirecting to unfamiliar websites.
The user has also noticed random pop-up windows. Which of the following is the
first step a technician should take to resolve the issue?
A. Scan for malware and ransomware.
B. Perform a system restore.
C. Check the network utilization.
D. Update the antivirus software.

A

Correct Answer:
A. Scan for malware and ransomware.
Explanation:
The symptoms described—slow performance, website redirections, and random
pop-ups—are indicative of a malware infection. The first step to resolve the issue is
to scan the laptop for malware and ransomware to identify and remove any
malicious software causing these problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Linux technician needs a filesystem type that meets the following requirements:
* All changes are tracked.
* The possibility of file corruption is reduced.
* Data recovery is easy.

Which of the following filesystem types best meets these requirements?
A. ext3
B. FAT32
C. exFAT
D. NTFS

A

Correct Answer:
A. Ext3
Breakdown of Each Choice:
* A. ext3:
o Correct: Offers journaling for tracking changes, reducing corruption,
and easy recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A branch office suspects a machine contains ransomware. Which of the following
mitigation steps should a technician take first?
A. Disable System Restore.
B. Remediate the system.
C. Educate the system user.
D. Quarantine the system

A

Correct Answer:
D. Quarantine the system
Explanation:
When ransomware is suspected on a machine, the first step is to isolate or
quarantine the system to prevent further spread of the infection to other machines
or network resources. This helps contain the ransomware and prevents additional
damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user’s Windows 10 workstation with an HDD is running really slowly. The user has
opened, closed, and saved many large files over the past week. Which of the
following tools should a technician use to remediate the issue?
A. Disk Defragment
B. Registry Editor
C. System Information
D. Disk Cleanup

A

Correct Answer:
a. Disk Defragment
Explanation:
When a Windows 10 workstation with an HDD is running slowly, especially after
opening, closing, and saving many large files, fragmentation of files on the disk may
be a contributing factor. Disk Defragmentation rearranges fragmented data on the
hard drive, optimizing its performance by reducing seek times and improving data
access speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to
find the BitLocker Drive Encryption menu item in Control Panel. Which of the
following explains why the technician is unable to find this menu item?
A. The hardware does not meet BitLocker’s minimum system requirements.
B. BitLocker was renamed for Windows 10.
C. BitLocker is not included on Windows 10 Home.
D. BitLocker was disabled in the registry of the laptop.

A

Correct Answer:
c.BitLocker is not included on Windows 10 Home.
Explanation:
BitLocker is only available in Windows 10 Pro, Enterprise, and Education editions,
not in the Home edition. This is why the technician cannot find it in the Control
Panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an example of MFA?
A. Fingerprint scan and retina scan
B. Password and PIN
C. Username and password
D. Smart card and password

A

Correct Answer:

D. Smart card and password:
o Correct: Combines “something you have” (smart card) and “something
you know” (password), representing true MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following features can be used to ensure a user can access multiple
versions of files?
A. Multiple desktops
B. Remote Disc
C. Time Machine
D. FileVault

A

Correct Answer:
c. Time Machine

Time machine will allow a Mac computer to go back “in time” to view the state of
machine at any given time.

File Vault is Mac’s version of full disk encryption

Remote Disc allows you to access optical drives on other computers over a
network.

Multiple desktops allows you to create separate virtual desktops to organize your
open windows and apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician downloaded a software program to a network share. When the
technician attempts to copy the program to the Windows tablet for installation, the
technician receives an error. Which of the following is the best procedure for the
technician to use to complete the assignment?
A. Copy the program file to a USB drive and install.
B. Burn the program file to a CD and install.
C. Format the HDD and then do the installation.
D. Replace the HDD and then do the installation

A

Correct Answer:
a. Copy the program file to a usb drive and install
Explanations:

A. Copy the program file to a USB drive and install: This option is a reasonable
approach. If the network share is causing issues, copying the program to a USB
drive and installing it directly from there can bypass any network-related problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A user reports that the hard drive activity light on a Windows 10 desktop computer
has been steadily lit for more than an hour and performance is severely degraded.
Which of the following tabs in Task Manager contains the information a technician
should use to identify the cause of this issue?
A. Services
B. Processes
C. Performance
D. Startup

A

B. Processes
The Processes tab provides detailed information about running processes,
including their resource usage (CPU, memory, and disk).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following items require special e-waste recycling? (Choose two.)
A. Solid-state drive
B. A/C adapter
C. Surge protector
D. Laptop battery
E. CRT monitor
F. Power supply

A

Correct Answer:
D. Laptop Battery
E. CRT Monitor

Laptop Battery:
* Why it requires special recycling:
o Laptop batteries contain hazardous materials, including lithium-ion
cells.
o These materials can be harmful to the environment if not disposed of
properly.

CRT Monitor (Cathode Ray Tube):
* Why it requires special recycling:
o CRT monitors contain leaded glass tubes.
o Lead is toxic and poses environmental risks if not managed correctly.

24
Q

A technician is installing software on a user’s workstation. The installation fails due
to incompliance with the HCL. Which of the following components is most likely
causing the installation to fail? (Choose two.)
A. NIC
B. CPU
C. PSU
D. KVM
E. RAM
F. DVI

A

Correct Answers:
B. CPU
E. RAM

We need to make sure the software is 32bit or 64bit depending on our CPU
architecture. Incompatible or faulty RAM modules might also cause installation
failures.

PSU, KVM, DVI have nothing to do with software installation failures. NIC could be
possible, but we would need to specifically be downloading the software from the
internet.

25
Q

A technician is hardening a company file server and needs to prevent unauthorized
LAN devices from accessing stored files. Which of the following should the
technician use?
A. Software firewall
B. Password complexity
C. Antivirus application
D. Anti-malware scans

A

Correct Answer:
A. Software Firewall
Software Firewall: Implement a software firewall to control network traffic and
restrict access to authorized devices. Firewalls can block incoming and outgoing
connections based on predefined rules, enhancing security.

26
Q

A user reports that an Android mobile device takes a long time to boot, and all

applications crash when launched. The user installed the applications from a third-
party website. Which of the following steps should the technician complete to diagnose the issue?
A. Scan the system for malware.
B. Clear the web browser cache
C. Enroll the device in an MDM system.
D. Confirm the compatibility of the applications with the OS.

A

Correct Answer:
A. Scan the system for malware

Explanation:
Installing apps from third-party websites can introduce malware, causing slow boot
times and crashes. Scanning for malware addresses this issue.

27
Q

Which of the following commands can a technician use to get the MAC address of a
Linux distribution?
A. net use
B. ifconfig
C. netstat
D. ping

A

Correct Answer:
B. Ifconfig

Explanation:
The ifconfig command in Linux is used to display network configuration details,
including the MAC address of network interfaces.

28
Q

A user recently purchased a second monitor and wants to extend the Windows
desktop to the new screen. Which of the following Control Panel options should a
technician adjust to help the user?
A. Color Management
B. System
C. Troubleshooting
D. Device Manager
E. Administrative Tools

A

Correct Answer:
B. System

Explanation:
To extend the Windows desktop to a second monitor, the technician needs to
adjust the display settings, which can be accessed through the “System” option in
the Control Panel. From there, the technician can configure multiple displays.

29
Q

Multiple users routinely record log-in information in readily accessible areas. Which
of the following is the best way to mitigate this issue?
A. Trusted sources
B. Valid certificates
C. User training
D. Password manager

A

Correct Answer:
C. User Training
Explanation:
User training is the best way to address the issue of users recording log-in
information in easily accessible areas. Training can help users understand the
importance of password security and the risks associated with improper handling
of log-in information.

30
Q

A large company is changing its password length requirements. The Chief
Information Officer is mandating that passwords now be at least 12 characters
long, instead of 10. Which of the following should be used to adjust this setting?
A. Group Policy
B. User accounts
C. Access control lists
D. Authenticator applications

A

Correct Answer:
A. Group Policy
Explanation:
Group Policy is a feature in Windows that allows administrators to manage settings
and configurations for users and computers within an Active Directory
environment. Changing the password length requirement is a policy that can be
enforced using Group Policy.

31
Q

A developer reports that a workstation’s database file extensions have been
changed from .db to .enc. The developer is also unable to open the database files
manually. Which of the following is the best option for recovering the data?
A. Accessing a restore point.
B. Rebooting into safe mode
C. Utilizing the backups
D. Using an AV to scan the affected files

A

Correct Answer:
C.Utilizing the backups

Explanation:
The change of file extensions from .db to .enc suggests that the files may have been
encrypted, possibly due to ransomware. The best way to recover the data in this
scenario is to use backups that were made before the files were encrypted.

32
Q

A user’s computer unexpectedly shut down immediately after the user plugged in a
USB headset. Once the user turned the computer back on, everything was
functioning properly, including the headset. Which of the following Microsoft tools
would most likely be used to determine the root cause?
A. Event Viewer
B. System Configuration
C. Device Manager
D. Performance Monitor

A

Correct Answer:
A. Event Viewer

Explanation:
Event Viewer is a Microsoft tool that logs detailed information about system events,
including hardware failures, system shutdowns, and errors. It can provide insights
into what caused the unexpected shutdown when the USB headset was plugged in.

33
Q

A technician is setting up a SOHO router in a user’s home. The user wants the
router to be configured to prevent access to malicious content and apply internet
access protection. Which of the following settings should the technician configure?
A. Port forwarding
B. Content filtering
C. Firmware updates
D. DHCP reservations

A

Correct Answer:
B. Content Filtering
Explanation:
Content filtering is a feature that allows a router to block access to certain websites
or types of content, such as malicious sites, providing a layer of internet access
protection.

34
Q

Which of the following protocols supports fast roaming between networks?

A. WEP
B. WPA
C. WPA2
D. LEAP
E. PEAP

A

Correct Answer:
C. WPA2
Explanation:
WPA2 (Wi-Fi Protected Access 2) with 802.11r (Fast BSS Transition) supports fast
roaming between networks. This protocol enhances the handoff process between
access points, allowing for seamless transitions without losing connection.

35
Q

A technician needs to configure security settings on a Windows 10 workstation.
Which of the following should the technician configure to limit password attempts?
A. Account Lockout Policy
B. User Access Control
C. System Protection
D. Firewall

A

Correct Answer:
A. Account Lockout Policy’
Explanation:
The Account Lockout Policy allows administrators to set limits on the number of
incorrect password attempts a user can make before their account is locked out,
effectively limiting password attempts.

36
Q

A technician has verified a computer is infected with malware. The technician
isolates the system and updates the anti-malware software. Which of the following
should the technician do next?
A. Run one scan and schedule future scans.
B. Back up the uninfected files and reimage the computer.
C. Restore the clean backup copies of the infected files.
D. Run repeated remediation scans until the malware is removed.

A

Correct Answer:
D. Run repeated remediation scans until the malware is removed.
Explanation:
After isolating and updating the anti-malware software on the infected system, it’s
crucial to run multiple scans to ensure complete removal of the malware.

37
Q

An administrator needs to select a method to dispose of SSDs containing sensitive
data. Which of the following are the most appropriate methods? (Choose two.)
A. Degauss
B. Delete
C. Incinerate
D. Recycle
E. Format
F. Shred

A

Correct Answer:
C. Incinerate
F. Shred

Physical destruction is the best way to ensure disposal given the information.

38
Q

A user receives a call from someone claiming to be a technical support agent. The
caller asks the user to log in to the computer. Which of the following security
measures should the user take to ensure security and privacy?
A. Only accept calls from known people.
B. Disregard any suspicious emails.
C. Update the antivirus software.
D. Enable two-factor authentication.
E. Install a malware scanner.

A

A. Only accept calls from known people.

The user received the call, only answer phone calls if we are expecting a call or
know the individual.

39
Q

Which of the following file extensions should a technician use for a PowerShell
script?
A. .ps1
B. .py
C. .sh
D. .bat
E. .cmd

A

Correct Answer:
a. .ps1

.py = python
.sh = bash
.bat = batch
.cmd = command script

40
Q

An IT services company that supports a large government contract replaced the
Ethernet cards on several hundred desktop machines to comply

with regulatory requirements. Which of the following disposal methods for the non-
compliant cards is the most environmentally friendly?

A. Incineration
B. Resale
C. Physical destruction
D. Dumpster for recycling plastics

A

Correct Answer:

B. Resale

Environmentally friendly because it extends the lifecycle of the cards by allowing others to use them, reducing waste.

41
Q

A user reports a hardware issue to the help desk. Which of the following should the
help desk technician do first when responding to the user?
A. Ask the user for the model number of the hardware.
B. Offer a temporary replacement device to the user.
C. Submit the issue to the manufacturer.
D. Remotely install updates to the device driver.

A

Correct Answer:
A. Ask the user for the model number of the hardware.
Explanation:
Before taking any further steps, the technician needs to identify the specific
hardware in question. Knowing the model number will help in diagnosing the
problem accurately and finding the appropriate solution.

42
Q

A user clicks a link in an email. A warning message in the user’s browser states the
site’s certificate cannot be verified. Which of the following is the most appropriate
action for a technician to take?
A. Click proceed.
B. Report the employee to the human resources department for violating company
policy.
C. Restore the computer from the last known backup.
D. Close the browser window and report the email to IT security.

A

Correct Answer:
D. Close the browser window and report the email to IT security.
Explanation:
This action helps prevent potential security breaches and ensures that the
suspicious email is investigated properly. Closing the browser window avoids any
immediate risk, and reporting the email to IT security helps protect the organization
from potential threats.

43
Q

An employee has repeatedly contacted a technician about malware infecting a work
computer. The technician has removed the malware several times, but the user’s
PC keeps getting infected. Which of the following should the technician do to
reduce the risk of future infections?
A. Configure the firewall
B. Restore the system from backups.
C. Educate the end user.
D. Update the antivirus program.

A

Correct Answer:
c.Educate the end user

People are the weakest link.

44
Q

A new spam gateway was recently deployed at a small business. However, users
still occasionally receive spam. The management team is concerned that users will
open the messages and potentially infect the network systems. Which of the
following is the most effective method for dealing with this issue?
A. Adjusting the spam gateway
B. Updating firmware for the spam appliance
C. Adjusting AV settings
D. Providing user training

A

Correct Answer:
D. Providing user training
Explanation:
User training is the most effective way to prevent users from opening spam and
infecting the network.

45
Q

A user’s application is unresponsive. Which of the following Task Manager tabs will
allow the user to address the situation?
A. Startup
B. Performance
C. Application history
D. Processes

A

Correct Answer:
D. Processes
Explanation:
The Processes tab in Task Manager allows users to see and manage running
applications and processes, including ending unresponsive ones.

46
Q

Which of the following file types allows a user to easily uninstall software from
macOS by simply placing it in the trash bin?
A. .exe
B. .dmg
C. .app
D. .rpm
E. .pkg

A

Correct Answer:
C. .app
Explanation:
The .app file type represents macOS application bundles. Users can uninstall these
applications by simply dragging them to the trash bin.

47
Q

After a security event, a technician removes malware from an affected laptop and
disconnects the laptop from the network. Which of the following
should the technician do to prevent the operating system from automatically
returning to an infected state?
A. Enable System Restore.
B. Disable System Restore.
C. Enable antivirus.
D. Disable antivirus.
E. Educate the user.

A

Correct Answer:
B. Disable System Restore.
Explanation:
Disabling System Restore prevents the operating system from reverting to a
previous restore point that might still contain the malware, thus avoiding
reinfection.

48
Q

A user is unable to access several documents saved on a work PC. A technician
discovers the files were corrupted and must change several system settings within
Registry Editor to correct the issue. Which of the following should the technician do
before modifying the registry keys?
A. Update the anti-malware software.
B. Create a restore point.
C. Run the PC in safe mode.
D. Roll back the system updates.

A

Correct Answer:
B. Create a restore point.

Explanation:
Creating a restore point ensures that the system can be reverted to its previous
state if any issues arise from modifying the registry.

49
Q

Which of the following is the most likely to use NTFS as the native filesystem?
A. macOS
B. Linux
C. Windows
D. Android

A

Correct Answer:
C.Windows
AFP = macOS
Ext3/4 = Linux
NTFS = Windows

50
Q

A technician is trying to connect to a user’s laptop in order to securely install updates. Given the following information about the laptop:

Hostname:corp-laptop-222
IP Address:192.168.0.45
Gateway:192.168.1.1
Subnet Mask:255.255.252.0
Open Ports: 21, 22, 80, 443

Which of the following should the technician do to connect via ROP?
A. Confirm the user can ping the default gateway.
B. Change the IP address on the user’s laptop.
C. Change the subnet mask on the user’s laptop.
D. Open port 3389 on the Windows firewall.

A

Correct Answer:
D.OPen port 3389 on the windows firewall.

This is because RDP is used on port 3389, and given the image, we do not see the
port number listed under the already open ports.

51
Q

A technician is installing RAM in a new workstation and needs to protect against
electrostatic discharge. Which of the following will best resolve this concern?
A. Battery backup
B. Thermal paste
C. ESD strap
D. Consistent power

A

Correct Answer:
C. ESD strap

Explanation:
An ESD (electrostatic discharge) strap is specifically designed to prevent static
electricity from damaging sensitive computer components during installation.

52
Q

A remote user’s smartphone is performing very slowly. The user notices that the
performance improves slightly after rebooting but then reverts back to performing
slowly. The user also notices that the phone does not get any faster after
connecting to the company’s corporate guest network. A technician sees that the
phone has a large number of applications installed on it. Which of the following is
the most likely cause of the issue?
A. The user is in a poor signal area.
B. The user has too many processes running.
C. The smartphone has malware on it.
D. The smartphone has been jailbroken.

A

Correct Answer:
B. The user has too many processes running.
Explanation:
Having a large number of applications installed can lead to many processes running
simultaneously, which can slow down the smartphone.

53
Q

A technician requires graphical remote access to various Windows, Linux, and
macOS desktops on the company LAN. The security administrator asks the
technician to utilize a single software solution that does not require an external
internet connection. Which of the following remote access tools is the technician
most likely to install?
A. NC
B. RMM
C. RDP
D. SSH

A

Correct Answer:
B. RMM
Explanation:
RMM (Remote Monitoring and Management) tools typically support graphical
remote access across various operating systems (Windows, Linux, macOS) and can
operate entirely within a local network without requiring an external internet
connection.

54
Q

A customer has a USB-only printer attached to a computer. A technician is
configuring an arrangement that allows other computers on the network to use the
printer. In which of the following locations on the customer’s desktop should the
technician make this configuration?
A. Printing Preferences/Advanced tab
B. Printer Properties/Sharing tab
C. Printer Properties/Security tab
D. Printer Properties/Ports tab

A

Correct Answer:
B. Printer Properties/Sharing tab
Explanation:
To share a USB printer with other computers on the network, the technician needs
to enable printer sharing. This configuration is done in the Printer Properties under
the Sharing tab.

55
Q

A technician needs to reimage a desktop in an area without network access. Which
of the following should the technician use? (Choose two.)

A. USB
B. PXE
C. Optical media
D. Partition
E. Boot record
F. SMB

A

Correct Answer:
A. USB
C. Optical Media
Explanation:
In an area without network access, the technician needs to use physical media to
reimage the desktop. Both USB drives and optical media (such as DVDs) are
suitable for this purpose.

56
Q

In an organization with a standardized set of installed software, a developer
submits a request to have new software installed. The company does not currently
have a license for this software, but the developer already downloaded the
installation file and is requesting that the technician install it. The developer states

that the management team approved the business use of this software. Which of
the following is the best action for the technician to take?

A. Contact the software vendor to obtain the license for the user, and assist the
user with installation once the license is purchased.
B. Run a scan on the downloaded installation file to confirm that it is free of
malicious software, install the software, and document the
software installation process.
C. Indicate to the developer that formal approval is needed; then, the IT team
should investigate the software and the impact it will have on the
organization before installing the software.
D. Install the software and run a full system scan with antivirus software to confirm
that the operating system is free of malicious software.

A

Correct Answer:
C. Indicate to the developer that formal approval is needed; then, the IT team should
investigate the software and the impact it will have on the organization before installing
the software.