A+ 1002 Flashcards
Domain 1
What is the maximum amount of RAM a 32-bit installation of Windows will see? Choices: 16GB 32GB 2GB 4GB
4GB
Domain 1
Which statement is true regarding compatibility between 32-bit and 64-bit operating systems? Choices: A. 32-bit apps are typically installed in the Program Files folder on a 64-bit system B. 32-bit apps can run on 64-bit systems C. 64-bit apps are typically installed in the Program Files (x86) folder on a 64-bit system D. 64-bit apps can only un if a system has 8GBofRAMor higher
B. 32-bit apps can run on 64-bit
systems
Domain 1
Which is the most recent version of Windows? Choices: Windows 8.1 Windows 8 Windows 10 Windows 10.1
Windows 10
Domain 1
Acustomer is looking for a desktop operating system. The customer specializes in graphic design and audio and video editing. Which operating system should a technician recommend? Choices: Apple MacintoshOS Windows iOS Linux
Apple MacintoshOS
Domain 1
Which operating system is featured on both desktops and tablets? Choices: iOS Linux Android Windows
Windows
Domain 1
Which two operating systems are open source? Choices: iOS Android Linux Windows
Android
Linux
Domain 1
Which mobile operating system is used on Apple devices? Choices: iOS Windows Android Linux
iOS
Domain 1
Which operating system is the Android equivalent on netbook devices? Choices: Pie ChromeOS Linux iOS
ChromeOS
Domain 1
What are the two main reasons to avoid running operating systems that have reached end-of-life status? Choices: The OS will be vulnerable to attack The OS will no longer receive updates The OS will cease to function Apps will no longer work on the OS
TheOSwill be vulnerable to attack
TheOSwill no longer receive
updates
Domain 1
In order for files to be readable on both Windows and MacOS, the files need to be on a drive with which format? Choices: FAT32 NTFS exFAT ReFS
exFAT
Domain 1
Which two editions of Windows 7 are not available for retail purchase? Choices: Professional Enterprise Home Starter
Enterprise
Starter
Domain 1
Which is the first edition of Windows to have the Charms bar? Choices: Windows 8.1 Windows 8 Windows 7 Windows 10
Windows 8
Domain 1
Which feature disappeared in Windows 8 but came back in Windows 8.1? Choices: Start button Taskbar Tiles Charms bar
Start button
Domain 1
What is the name of the voice-based search feature in Windows 10? Choices: Siri Cortana Searcher Alexa
Cortana
Domain 1
Which is the minimum edition of Windows eligible to join a network domain? Choices: Enterprise Starter Professional Home
Professional
Domain 1
Which tool is used to encrypt entire hard drives? Choices: Digital Signatures EFS Disk Management BitLocker
BitLocker
Domain 1
Which two versions of Windows have Windows Media Center? Choices: Windows 8 Professional Windows 7 Home Windows 7 Home Premium Windows 8 Home
Windows 8 Professional
Windows 7 Home Premium
Domain 1
Which is a bandwidth optimization feature that allows content to be cached on a local hard drive? Choices: DirectAccess QoS EFS BranchCache
BranchCache
Domain 1
Which two editions of Windows have tiles for apps and no traditional Start menu? Choices: Windows 10 Windows 8.1 Windows 8 Windows 7
Windows 8.1
Windows 8
Domain 1
Which medium is likely to be too small for holding operating system installation files? Choices: Internal drive Flash drive Network boot CD
CD
Domain 1
An administrator wants to use an external drive as a source for an operating system installation. What should be done first on the system about to receive the install? Choices: A. Disable the old OS B. Make sure the boot order in the BIOS is set properly C. Uninstall the old OS D. Delete the old OS
B. Make sure the boot order in the BIOS is set properly
Domain 1
How do PXE boots take place for installing an operating system? Choices: A. Boot happens on an external drive B. Boot takes placement over the network C. Boot happens on a DVD D. Boot happens on an internal drive
B. Boot takes placement over the
network
Domain 1
Where should installation files be located on an internal hard drive for a clean install of Windows? Choices: A. In C:\Images B. On C: C. On a different partition D. In C:\Windows
C. On a different partition
Domain 1
Which type of file is needed in order to perform an unattended installation of Windows? Choices: Answer Unattended Question Attended
Answer
Domain 1
A user has Windows 8.1 Home edition. Which version of Windows 10 can the user upgrade to? Choices: Windows 10 Enterprise Windows 10 Home Windows 10 Education Windows 10 Professional
Windows 10 Home
Domain 1
For homes and small businesses, which two types of installations are the most common installations of Windows? Choices: Network boot Unattended In-place upgrade Clean install
In-place upgrade
Clean install
Domain 1
When doing a repair installation of Windows, what happens to a user's current Windows data? Choices: A. It is moved to a Windows.old folder B. It is moved to a Windows.backup folder C. It stays in the same place D. It is deleted
A. It is moved to a Windows.old
folder
Domain 1
Which is considered a best practice for multiboot installations? Choices: A. Install the oldest operating system last B. Install the Windows operating system last C. Install the newest operating system last D. Install the non-Windows operating system last
C. Install the newest operating
system last
Domain 1
Which two statements are true regarding network installations of Windows? Choices: A. The system receiving the installation must have network boot enabled in the BIOS or UEFI B. The server hosting the installation must have network boot enabled in the BIOS or UEFI C. The installation media must be on a Windows server D. A 10Gbps network connection is preferable
D. A 10Gbps network connection is preferable
Domain 1
For Windows installations, which deployment type is suitable for when installations need to include apps and settings to be deployed on multiple systems? Choices: Recovery partition DVD Image Network
Image
Domain 1
Which best describes what a recovery partition on a computer typically stores? Choices: System files Backup software The original image deployed on the computer OEM software
The original image deployed on
the computer
Domain 1
Which reinstall method in Windows looks for and replaces corrupt system files? Choices: Restore Reset Upgrade Refresh
Refresh
Domain 1
A user wants to resize a basic partition on a hard drive. What must be done to the drive first? Choices: It needs to be expanded It needs to be converted to a dynamic partition It needs to be formatted It needs to be shrunk
It needs to be converted to a
dynamic partition
Domain 1
How are primary partitions determined on a hard drive? Choices: They are the first partitions created They are the first formatted partitions created They are the largest partitions created They are the partitions that hold operating systems
They are the partitions that hold
operating systems
Domain 1
Which type of partition is needed on a hard drive in order to have more than four logical drives, each with a drive letter on a single physical hard drive? Choices: Primary Extended Dynamic Basic
Extended
Domain 1
How many GPT partitions can be on one disk? Choices: 32 256 128 4
128
Domain 1
What is the maximum partition size on a disk using an exFAT format? Choices: 32GB 2 TB 512 TB 256 TB
512 TB
Domain 1
What is the maximum partition size on a disk using a FAT32 format? Choices: 32GB 512 TB 2 TB 256 TB
2 TB
Domain 1
Which partition format supports file and folder encryption? Choices: CDFS exFAT NTFS FAT32
NTFS
Domain 1
Which file system is commonly used on CDs? Choices: exFAT FAT32 CDFS NTFS
CDFS
Domain 1
Which is a distributed file system that allows a client computer to access files over a network? Choices: CDFS NFS NTFS ReFS
NFS
Domain 1
Which operating system uses ext3 and ext4 for disk formats? Choices: Linux Android Windows MacOS
Linux
Domain 1
Which Mac OS file system is used on Mac OS versions 10.12 and older? Choices: ext3 NTFS HFS NFS
HFS
Domain 1
Which is the Linux equivalent of the page file in Windows? Choices: Page space Page partition VM file Swap partition
Swap partition
Domain 1
Which best describes what actually happens when a a quick format is performed on a hard drive? Choices: Files on the drive have their access removed The drive has zeros written on it The drive is emptied The drive has ones written on it
Files on the drive have their
access removed
Domain 1
For loading third-party drivers during a Windows installation, on what media do the drivers need to be? Choose two answers. Choices: HDD SSD USB drive Optical drive
USB drive
Optical drive
Domain 1
Which type of network will most Windows devices be connected to in a home network? Choices: Workgroup Internal Domain HomeGroup
Workgroup
Domain 1
Which is the first step in a Windows installation once the installation process starts? Choices: File system format choice Partition to install Entering a product key Language and time format
Language and time format
Domain 1
Which tool should be used to check to see if any peripherals need drivers right after a Windows installation? Choices: Device Manager System Information Computer Management System Configuration
Device Manager
Domain 1
Besides a primary partition, which type of partition should be present on a computer right after a Windows installation? Choices: Extended Basic Logical Recovery
Recovery
Domain 1
What is the recommended minimum amount of RAM for a 64-bit installation of Windows? Choices: 2GB 1GB 4GB 3GB
2GB
Domain 1
A user has Windows 10 but needs to run an app that was built for Windows 7. How should the user run the app? Choices: Legacy Mode Virtual Mode Embedded Mode Compatibility Mode
Compatibility Mode
Domain 1
Which versions of Windows can upgrade to Windows 10? Choose two answers. Choices: Windows 7 Windows 8.1 Windows 8 Windows Vista
Windows 7
Windows 8.1
Domain 1
Which Windows command lists the files inside of a folder? Choices: ls sd show dir
dir
Domain 1
Which Windows command takes a user up a level of folders in a folder structure? Choices: cd\ cd.. md\ md..
cd..
Domain 1
A user states that a frequent website the user visits cannot be reached. Which command should a technician run in order to test connectivity to the site? Choices: nslookup ping tracert ipconfig
ping
Domain 1
A user states that there are intermittent connectivity problems to the Internet. Which command should a technician run in order to isolate where the connection might be dropping? Choices: ping tracert ipconfig nslookup
tracert
Domain 1
A technician wants to see established TCP connections on a device. Which command should the technician run to get this list? Choices: netstat -a tcp netstat -c tcp netstat -proto tcp netstat -p tcp
netstat -p tcp
Domain 1
A technician wants to see the advertised DNS server address for google.com. Which command should the technician run? Choices: nslookup google.com finddns google.com lookup google.com dns google.com
nslookup google.com
Domain 1
A junior technician wants to add a command that will restart a device at the end of an installation. Which command should the technician add? Choices: restart -r shutdown restart shutdown -r
shutdown -r
Domain 1
Which are the two main uses for the Dism command? Choices: Deploy a system image Prepare a system image for deployment Scan and repair a system image Build a system image
Prepare a system image for
deployment
Scan and repair a system image
Domain 1
Which two commands can check for and attempt to fix errors on a system? Choices: fixdsk scannow sfc chkdsk
sfc
chkdsk
Domain 1
Which command can list both disks and partitions on a device? Choices: dir diskpart disklookup chkdsk
diskpart
Domain 1
A user was told an app was installable as a result of a policy change on a domain, but the user still cannot install the app. What can a technician run on the device to force the policy change? Choices: gpchange gpupdate gpresult gpforce
gpupdate
Domain 1
In an effort to troubleshoot rights on a device, a technician want to see which Group Policy settings apply to a user. Which command should the technician run? Choices: gpresult /R gpresult gpresult /U gpresult /P
gpresult /R
Domain 1
When running the format command, what will be formatted? Choices: Folders Hard drives Accounts Files
Hard drives
Domain 1
A user runs this command: copytempalte.docxtemplate2.docx. What happens as a result of that command? Choices: A. template2.docxhas been copied to the template.docxfolder B. template.docxhas been copied to a file named template2.docx C. template2.docxhas been copied to a file named template.docx D. template.docxhas been copied to the template2.docxfolder
B. template.docxhas been copied to a file named template2.docx
Domain 1
A junior technician wants to make sure all subdirectories from the c:\u201 folder get copied to the c:\u202folder. Which command should the junior technician run? Choices: xcopyc:\u201 c:\u202 /s xcopyc:\u201 c:\u202 /sub copyc:\u201 c:\u202 /sub copyc:\u201 c:\u202 /s
Domain 1
A user runs this command: robocopyc:\u202 c:\u203. What gets copied from u202 to u203? Choices: Files Folders and subdirectories Folders The entire directory structure
The entire directory structure
Domain 1
Which command would a technician need to run to map a user's P drive to the Techies folder on the 1002winserver server? Choices: A. net use p: \\1002winserver\Techies B. net user p: \\1002winserver\Techies C. map p: \\1002winserver\Techies D. net map p: \\1002winserver\Techies
A. net use p:
\1002winserver\Techies
Domain 1
A technician needs to see when a user last logged on to a device. Which command can the technician run to accomplish this? Choices: use net user net use user
net user
Domain 1
Which switch, entered after a command, returns a list of switches the command uses? Choices: /switch /man /help /?
/?
Domain 1
Which commands must be run with an elevated command prompt? Choose two answers. Choices: shutdown sfc dism dir
sfc
dism
Domain 1
Which administrative tool is used to display other system tools? Choices: System Information Computer Management Device Manager System Configuration
Computer Management
Domain 1
A user claims a hardware device is not found. Upon looking at Device Manager, an administrator notices a black arrow next to the device in question. What does this indicate? Choices: The device is unplugged The device has malfunctioned The device is disabled The device has the wrong driver installed
The device is disabled
Domain 1
Which two local user accounts should be disabled by default? Choices: Administrator User Backup operator Guest
Administrator
Guest
Domain 1
Which are the two main features of the Local Security Policy tool? Choices: Account policies Administrative tasks Security policies User rights assignments
Account policies
User rights assignments
Domain 1
Which three areas of device performance are visible from the initial Performance Monitor screen? Choices: Memory Tasks Physical Disk Network Processor Information
Memory
Physical Disk
Processor Information
Domain 1
What should one do with an unnecessary service? Choices: Set it to start up manually Disable it Remove it Stop it
Disable it
Domain 1
Apps set to start up when a system is booted are contained in the System Configuration tool in which operating system? Choices: Windows 7 Windows 8 Windows 10 Windows 8.1
Windows 7
Domain 1
A system administrator needs to run a scanning app daily. Where can this be set up? Choices: System Configuration Services System Information Task Scheduler
Task Scheduler
Domain 1
Building blocks that work toward building object-oriented applications are managed in which administrative tool? Choices: Data Sources Task Scheduler Component Services System Configuration
Component Services
Domain 1
A user needs to set up a connection to SQL Server database. Which tool can the user use to accomplish this task? Choices: System Configuration Data Sources Task Scheduler Component Services
Data Sources
Domain 1
The Print Management tool can be used on which operating system? Choices: Windows MacOS Linux Android
Windows
Domain 1
Which app runs the Windows Memory Diagnostic tool? Choices: wmdiag dxdiag msdiag mdsched
mdsched
Domain 1
Which are the main types of event logs in the Event Viewer? Choose three answers. Choices: System Auditing Application Syslog Security
System
Application
Security
Domain 1
Which is the default setting for User Account Control?
Choices:
A. Notify only when apps try to make changes
B. Never notify
C. Notify when apps try to make
changes without dimming the desktop
D. Always notify
C. Notify only when apps try to make changes
Domain 1
Which tab within Msconfig has startup selections? Choices: Startup Boot Services General
Boot
Domain 1
In which mode should a system be booted into in order to run antimalware effectively? Choices: Safe Mode Windows RE VGAMode Config Mode
Safe Mode
Domain 1
What can be done with a service inside of Msconfig? Choices: Started Disabled Stopped Removed
Disabled
Domain 1
In which tool is the startup options located in Windows 10? Choices: Msconfig Task Manager System Information Computer Management
Task Manager
Domain 1
Which type of tools are located on the Tools tab of the Msconfig window? Choices: Windows tools Boot tools Services Startup options
Windows tools
Domain 1
Which tab in Task Manager in Windows 10 allows one to see apps and the resources they have taken since the last time booting up? Choices: Processes Performance history Details App history
App history
Domain 1
In which edition of Windows do apps running not show on the Processes tab? Choices: Windows 7 Windows 8 Windows 10 Windows 8.1
Windows 7
Domain 1
On which Task Manager tab can one see a mini-snapshot of CPU, memory, disk, and network statistics? Choices: Applications Performance Resources Processes
Performance
Domain 1
In which edition of Windows does Networking appear on its own tab in Task Manager? Choices: Windows 10 Windows 7 Windows 8 Windows 8.1
Windows 7
Domain 1
Which best describes the list of users on the Users tab in Task Manager? Choices: Users who are logged on to the device Administrative users on the device Users who have an account on the device Standard users on the device
Users who are logged on to the
device
Domain 1
What is the drive status one hopes to see when looking at drives using the Disk Management tool? Choices: Running Basic Primary Healthy
Healthy
Domain 1
What is needed in order to mount a drive? Choose two answers. Choices: An empty NTFS-formatted folder A virtual hard drive A partition that is not assigned a drive letter An empty hard drive partition
An empty NTFS-formatted folder
A partition that is not assigned a
drive letter
Domain 1
A new disk has been installed and is showing in the Disk Management tool. In order for the drive to be put to use, what is the first step an administrator needs to take? Choices: Format the drive Initialize the drive Create a partition Extend the drive
Initialize the drive
Domain 1
Before a disk partition can be split, what must be done to it? Choices: It must have been extended It must be shrunk It must be emptied It must be formatted
It must be shrunk
Domain 1
A drive is added to a device. It is not recognized right away. Which option in Disk Management could one run to have the device try to find the drive? Choices: Add Disks Device Manager Refresh Disks Rescan Disks
Rescan Disks
Domain 1
How are most RAIDs set up on a computer? Choices: As a hardware RAID through Disk Management As a software RAID in the system BIOS As a software RAID through Disk Management As a hardware RAID in the system BIOS
As a hardware RAID in the system
BIOS
Domain 1
When creating a storage pool with two different-sized disks in Windows, what will be the size of the storage pool? Choices: The sum of the disks The size of the larger disk The difference between the two disks The size of the smaller disk
The size of the smaller disk
Domain 1
Which registry hive stores file associations? Choices: HKEY_LOCAL_MACHINE HKEY_CURRENT_USER HKEY_CLASSES_ROOT HKEY_CURRENT_CONFIG
HKEY_CLASSES_ROOT
Domain 1
What happens when a user without administrative privileges tries to run a command prompt in elevated mode? Choices: The UAC window pops up to confirm the opening The command prompt opens The user is asked to provide administrative credentials The user is denied access to the command prompt
The user is asked to provide
administrative credentials
Domain 1
What is the name of the Services tool? Choices: services.msi services services.exe services.msc
services.msc
Domain 1
Which tool allows one to set up custom consoles to manage tools and utilities? Choices: System Management Console Microsoft Management Console Disk Management Console Computer Management Console
Microsoft Management Console
Domain 1
What information on a device can be used to connect to the device via MSTSC? Choose two answers. Choices: IP address Device name Port Username
Device name
Username
Domain 1
A user wants a text editing tool that will put absolutely no formatting onto the text. Which tool should a technician recommend to the user? Choices: Pages Word WordPad Notepad
Notepad
Domain 1
In which tool can a user control whether to view extensions on files? Choices: Explorer This PC Finder Msconfig
Explorer
Domain 1
A technician needs to knowhow much RAM a system has. Which tool can the technician use to find this out? Choices: MSC MSRAM Msconfig Msinfo32
Msinfo32
Domain 1
Which tool shows the version of DirectX on a Windows device? Choices: Directxshow Directxdiag Dxshow Dxdiag
Dxdiag
Domain 1
Which types of disks do not need disk defragmenter run on them? Choices: Internal drives SSDs HDDs External drives
SSDs
Domain 1
What can be controlled within Windows Update settings? Choose three answers. Choices: Which specific apps are updated The update history When updates are installed The hours in which updates occur What downloads during an update
The update history
When updates are installed
The hours in which updates occur
Domain 1
In which tab in Internet Options would one set a proxy server? Choices: General Privacy Security Connections
Connections
Domain 1
Which types of websites are most commonly found in the Trusted Sites area of the Internet Options window? Choices: External Public Internal Private
Internal
Domain 1
A user wants to delete browsing history for Microsoft Edge. Which Internet Options tab should an administrator use to make this happen? Choices: Programs Privacy Security General
General
Domain 1
What can be controlled on the Privacy tab within Internet Options? Choices: Temporary Internet files Cookies Browsing history Accessibility
Cookies
Domain 1
In which version of Windows can the default web browser be set in the Settings area rather than in the Control Panel? Choices: Windows 10 Windows 8 Windows 7 Windows 8.1
Windows 10
Domain 1
In which tab in Internet Options would one restore Internet Explorer or Microsoft Edge to its default settings? Choices: Security General Programs Advanced
Advanced
Domain 1
Which screen resolution in Windows offers the best quality picture on a screen? Choices: 1280 x720 1024 x768 The monitor recommendation 1920 x1080
The monitor recommendation
Domain 1
How many colors are supported in a 32-bit color depth setting? Choices: 32 to the 2nd power 2 * 32 32 2 to the 32nd power
2 to the 32nd power
Domain 1
A user set the refresh rate on a monitor to higher than the monitor supports and the monitor now displays nothing. Which two tasks could a technician do to fix the problem? Choices: Reboot into Safe Mode Plug in a different monitor Reboot into Windows RE Reboot into VGAMode
Reboot into Safe Mode
Reboot into VGAMode
Domain 1
Which two account types are the two main account types on a Windows device? Choices: Standard Administrator Guest Power User
Standard
Administrator
Domain 1
Within File Explorer, In which tab under Folder Options can one control how an item is clicked when one wants to open an item? Choices: Search View Navigate General
General
Domain 1
When is virtual memory used on a PC? Choices: When a machine is running a virtual reality app When a machine is out of hard disk space When a machine is out of RAM When a virtual machine is running
When a machine is out of RAM
Domain 1
What must be configured within Remote Desktop settings before one can remote into a machine? Choices: When Remote Desktop is enabled The port on which Remote Desktop will run The IP address of the machine Who can connect to the machine
Who can connect to the machine
Domain 1
In this Control Panel window, where does one click to start the process of creating a restore point? Choices: System protection Device manager Remote settings Advanced system settings
System protection
Domain 1
How many firewalls should be turned on per host machine on a network? Choices: 2 1 0 if the network firewall is on 3
1
Domain 1
Which are available power options on a Windows device? Choose three answers. Choices: Balanced Sleep Power saver Low performance High performance
Balanced
Power saver
High performance
Domain 1
In which power state is a laptop in when it is shut down in a way to where a snapshot of the RAM is taken and then stored on the hard drive? Choices: Standby Sleep Hibernate Suspend
Hibernate
Domain 1
In which three power modes is a laptop off but RAM is not transferred to hard drive and the laptop can be woken up through tapping the mouse or trackpad? Choices: Suspend Standby Sleep Hibernate Shutdown
Suspend
Standby
Sleep
Domain 1
Which two main types of credentials are managed through Credential Manager? Choices: Token App Web Windows
Web
Windows
Domain 1
In which version of Windows was HomeGroups removed? Choices: Windows 8.1 Windows 10 Windows 7 Windows 8
Windows 10
Domain 1
Which categories are accessible for troubleshooting through the Control Panel? Choose four answers. Choices: IP Addressing Network and Internet Programs Hardware and Sound Device Installation System and Security
Network and Internet
Programs
Hardware and Sound
System and Security
Domain 1
Which Control Panel tool allows for checking network connections and IP address information and allows for diagnosing network connections that are not working? Choices: IP Addressing Network and Internet Network and Sharing Center Network Properties
Network and Sharing Center
Domain 1
A user looks in Device Manager and notices that a network card has a black arrow next to it. What does the black arrow signify? Choices: The network card just had drivers downloaded The network card was just uninstalled The network card has incorrect drivers The network card is disabled
The network card is disabled
Domain 1
What does BitLocker encrypt? Choices: Files Hard drives Folders CPU
Hard drives
Domain 1
Which best describes the role of Sync Center on a Windows device? Choices: Synchronize settings with a network drive Synchronize settings across devices Synchronize files with a network drive Synchronize files across devices
Synchronize files with a network
drive
Domain 1
Which are considered the three most important factors for application installations on a device? Choices: Drive space RAM Screen size Operating system compatibility Available peripherals
Drive space
RAM
Operating system compatibility
Domain 1
Besides downloading software, what are common sources used for software installations? Choose three answers. Choices: USB drive CD Network location Floppy disk Virtual drive
USB drive
CD
Network location
Domain 1
Which folder is typically used for installations of 32-bit apps on a 64-bit operating system? Choices: C:\Program Files (x32) C:\Program Files C:\Program Files (32-bit) C:\Program Files (x86)
C:\Program Files (x86)
Domain 1
Which is true about steps to take to make sure an app does not have a negative impact on a device when installed? Choose two answers. Choices: Apps should be made to not move malware onto a system Apps should come from a trusted publisher Automatic updates should never be allowed Apps should not open a hole in the firewall
Apps should come from a trusted
publisher
Automatic updates should never
be allowed
Domain 1
An administrator wants to make sure a new app which requires network resources, takes a low amount of network resources. What can be set in order to
ensure that an app does not take much bandwidth?
Choices:
Routing protocol
Resource optimization
Port settings
QoS
QoS
Domain 1
Which type of network allows for all devices on the network to share a common password? Choices: Peer-to-peer Workgroup Domain HomeGroup
HomeGroup
Domain 1
Which type of network requires a separate username and password for each device on the network? Choices: HomeGroup Client Domain Workgroup
Workgroup
Domain 1
Which type of network is considered a client/server network? Choices: HomeGroup Domain Workgroup Peer-to-peer
Domain
Domain 1
Which is an example of an administrative share? Choices: \\winserver\c$ \\winserver \\winserver\admin \\winserver\c
\winserver\c$
Domain 1
Which specific permissions does a user or group need on a printer, in its printer properties, in order to print to that printer? Choices: Print permission on the Sharing tab Access permission on the Security tab Print permission on the Security tab Access permission on the Sharing tab
Print permission on the Sharing
tab
Domain 1
Which version of Windows allows one to set up a VPN without having to go through the Network and Sharing Center? Choices: Windows 8 Windows 8.1 Windows 7 Windows 10
Windows 10
Domain 1
Besides a modem and a phone line, what else is needed to establish a dial-up connection with a network? Choices: An ISDN line A phone number from a provider A coaxial cable A T1 line
A phone number from a provider
Domain 1
Which is true about wireless network connections? Choose two answers. Choices: The network can be forgotten The network connection always uses DHCP to get an IP address The network connection always requires a password The network can be set to connect automatically to it
The network connection always
requires a password
The network can be set to connect automatically to it
Domain 1
A user wants to know how much configuration will be needed for establishing a wired network connection after plugging a laptop into a router. The router is
giving out IP addresses via DHCP. What should the user have to configure?
Choices:
The DNS server address
The default gateway
Nothing
The DHCP server address
Nothing
Domain 1
Which type of network connects devices to the Internet through mobile hotspots? Choices: WWAN LAN WAN WLAN
WWAN
Domain 1
Which are the two main roles of proxy servers? Choices: Cache content Content filtering Handle Internet requests Perform NAT translations
Cache content
Handle Internet requests
Domain 1
Which run command opens Remote Desktop Connection? Choices: RDC MSTSC RD REMOTE
MSTSC
Domain 1
In Windows, which type of remote connection allows one to see what the other is doing on a screen? Choices: Remote Assistance VNC Screen Share Remote Desktop
Remote Assistance
Domain 1
A user joins a network in an airport. Which choice should a user make when presented with a list of choices in order to best secure the device from the other devices on the network? Choices: Visiting Work Private Public
Public
Domain 1
Which are known as firewall exceptions? Choose two answers. Choices: Blocking specific ports Allowing specific ports Blocking outbound traffic Allowing inbound traffic
Blocking outbound traffic
Allowing inbound traffic
Domain 1
On a domain, what is used to set the same firewall policy for every device in the domain? Choices: Windows Defender Firewall Windows Firewall with Advanced Security Local Security Policy Group Policy
Group Policy
Domain 1
Which three types of networks can have separate on and off settings for firewalls in Windows Firewall? Choices: Home Domain Public Private Work
Domain
Public
Private
Domain 1
In these properties for a Wi-Fi adapter, where would one click to start the process of configuring an alternate IP address, subnet mask, DNS address, and default gateway for the adapter? Choices: Client for Microsoft Networks Configure Microsoft Network Adapter Multiplexor Protocol Internet Protocol Version 4
Internet Protocol Version 4
Domain 1
What are speed and duplex settings usually set to on a gigabit network card? Choices: Auto Negotiation 1 GB Half Duplex 100 MB Half Duplex 1 GB Full Duplex
Auto Negotiation
Domain 1
Which network card setting must be enabled in order for an administrator to boot a device remotely? Choices: Power on LAN PXE Wake on LAN Sleep
Wake on LAN
Domain 1
What is the primary use for QoS? Choices: Prioritizing network cards Prioritizing network traffic Prioritizing network services Prioritizing network devices
Prioritizing network traffic
Domain 1
A junior technician installed a network card onto a PC that already had an on-board network card. The second network card is causing memory conflicts for both network cards. What is the best way to solve this problem? Choices: Disable the on-board network card in the BIOS Disable the on-board network card in Device Manager Remove the on-board network card Change memory settings on both network cards
Disable the on-board network
card in the BIOS
Domain 1
Which two tools are used to facilitate backups on a Mac? Choices: Time Machine System Preferences iTunes iCloud
Time Machine
iCloud
Domain 1
Which tool can help create a RAID on a Mac? Choices: Disk Management RAID Maker System Preferences Disk Utility
Disk Utility
Domain 1
Through which app are system updates obtained for a Mac? Choices: App Store Mac Updates System Preferences Disk Utility
App Store
Domain 1
Which types of updates are usually obtained automatically on a Mac? Choose two options. Choices: System Patches Hardware Firmware
System
Patches
Domain 1
For antimalware on a Mac, what is the most important task to do with the antimalware? Choices: Make sure it can run scans remotely Run the app on a weekly basis Keep the app version updated Keep the definitions updated
Keep the definitions updated
Domain 1
Which Mac tool is used to back up entire hard drives? Choices: Time Machine Backup Pro iCloud iTunes
Time Machine
Domain 1
Which are two ways in which a Mac OS can be restored? Choices: iCloud First Aid Internet drive Time Machine
Internet drive
Time Machine
Domain 1
Which tool performs disk maintenance tasks on a Mac? Choices: Disk Management System Preferences Disk Utility First Aid
Disk Utility
Domain 1
Which is the Mac equivalent of a Windows command prompt? Choices: Terminal Vim Bash Grep
Terminal
Domain 1
Which types of devices can a Mac user share a screen with using Screen Sharing? Choices: Macs and Windows devices Macs, Linux, and Windows devices Macs Macs and Linux devices
Macs
Domain 1
Which is the Mac equivalent of the End Task feature in Windows? Choices: Kill Force Quit Task End Task Kill
Force Quit
Domain 1
Which Mac tool is used to support multiple desktops? Choices: Screen Sharing Spotlight Mission Control Keychain
Mission Control
Domain 1
Which Mac tool is used to store passwords and certificates? Choices: Spotlight Password manager Keylogger Keychain
Keychain
Domain 1
Which Mac tool is used to conduct searches across files, apps, and websites? Choices: Finder Mission Control Spotlight Keychain
Spotlight
Domain 1
Which app uses an Apple ID to back up and sync files across a user's Mac and Windows devices? Choices: Finder iCloud Keychain iTunes
iCloud
Domain 1
Match the Mac gesture with its action. Gesture: Pinch trackpad Three-finger swipe Two-finger double tap Spread three fingers and thumb
Action: Zoom Show Desktop Magnifies text Swipes between full screen apps
Pinch trackpad = Zoom
Three-finger swipe = Swipes between full screen apps
Two-finger double tap = Magnifies text
Spread three fingers and thumb = Show Desktop
Domain 1
Which tool on a Mac helps users to organize files and folders? Choices: Finder File Finder Explorer File Explorer
Finder
Domain 1
Which would best describe when one needs to use the Remote Disk feature on a Mac? Choices: To use someone else's DVD drive to perform an installation To access files via iCloud To restore a Mac OS installation over the Internet To access files on a network share
To use someone else’s DVD drive
to perform an installation
Domain 1
On a Mac, which side of the Dock holds open and commonly used apps? Choices: Left Right Top Bottom
Left
Domain 1
Which app allows for setting up a Mac device to run Windows? Choices: Dual Boot Boot Camp Virtual PC Virtual Windows
Boot Camp
Domain 1
Which Linux command will list files and folders within a location on a Linux drive? Choices: list dir show ls
ls
Domain 1
A user runs this command on a Linux device: grep "U*" test.odt. What is the user looking to see as a result? Choices: Any file that contains U* in the test.odt folder Any word that contains U* in the test.odt file Any word that starts with U in the test.odt file Any file that starts with U in the test.odt folder
Any word that starts with U in the
test.odt file
Domain 1
What does the cd command in Linux do when run? Choices: Cascade directory Copy directory Change directory Create directory
Change directory
Domain 1
Which command turns off a system in Linux? Choices: shutdown -R shutdown -T shutdown -S shutdown -P
shutdown -P
Domain 1
Which Linux command allows a user to change a password? Choices: password pwd passwd set
passwd
Domain 1
Which Linux command moves a file from one folder to another? Choices: mov mv md move
mv
Domain 1
A Linux user wants to copy the test2 file to the testing folder. What should the user type to accomplish this? Choices: copytest2 testing cp test2 testing cp testing test2 copy testing test2
cp test2 testing
A Linux user wants to delete the test3 file from the current folder. What should the user type to accomplish this? Choices: delete test3 remove test3 rm test3 del test3
rm test3
A Linux administrator runs the following command: chmod u+rwtest2.odt. What did the administrator accomplish with this command? Choices: Set the owner of the test2.odt to the users group Set users to have read and write permissions on the test2.odt file Set users not to have read and write permissions on the test2.odt file Set users to be able to give read and write permissions on the test2.odt file to others
Set users to have read and write
permissions on the test2.odt file
A Linux administrator wants to make a different administrator an owner of a file. Which command should the administrator run? Choices: chmod chown owner sudo
chown
Which Linux command obtains IP address information for wired NICs on a device? Choices: iwconfig ipconfig ifconfig inconfig
ifconfig
A technician wants to see a list of running processes in the Linux terminal. Which command should the technician run? Choices: tasklist ps ts ls
ps
A user is trying to install a package and getting a message that the installation requires administrative privileges. What should the user add to the command to be able to run the install package? Choices: sudo elevate su admin
sudo
Which command is used to install packages in Linux? Choices: su install sudo apt-get
apt-get
Which command launches a text editor within Linux? Choices: vi apt-get notes notepad
vi
Which Linux command copies system files and images from one location to another? Choices: copy cp cd dd
dd
In Linux, which command is used to terminate a process? Choices: taskkill kill end taskend
kill
Which type of physical security measure involves a room between two security doors, with the intent of a person who enters the first door in an unauthorized
manner being prevented from going through the second door?
Choices:
Bollard
Mantrap
Faradaycage
Tempest
Mantrap
Which describes the best place to place a badge reader? Choices: Next to a door Within the view of a physical security control Several feet from a door Within the view of a security guard
Within the view of a physical
security control
Which best describes what is stored on a chip inside of a smart card? Choices: Device information User information Authentication information Authorization information
Authentication information
Which are roles of security guards? Choose two answers. Choices: Serve as an internal deterrent Act as an external deterrent Get users escorts if needed Ensure users provide proper identification
Get users escorts if needed
Ensure users provide proper
identification
Which type of lock requires a key combination to be entered in order to be unlocked? Choices: Combo lock Deadbolt lock Cipher lock Simple lock
Cipher lock
What can unlock a biometric lock? Choose two answers. Choices: Key Fingerprint Combination Retina
Fingerprint
Retina
A one-time password token requires one to use what kind of information besides a username and password to log on to a specific location? Choices: Key Fingerprint Retina Numeric code
Numeric code
Which type of equipment is often locked using a cable lock? Choices: Servers Laptops Ethernet cables Desktops
Laptops
Server locks are not just locks but in fact they are mini-\_\_\_\_\_\_\_\_\_\_\_\_\_\_. Choices: racks closets cabinets keychains
cabinets
Which two purposes do USB locks have? Choices: Lock a specific USB device out of a port Lock a specific port Lock all USB ports on a device Lock a specific USB device in a port
Lock a specific port
Lock a specific USB device in a
port
Which infiltration mechanism is effectively blocked through the use of privacy screens? Choices: Man-in-the-middle attack Shoulder surfing Eavesdropping Social engineering
Shoulder surfing
Which type of device is primarily used to access parking garages? Choices: Smart card Key fob Hardware token One-time password key
Key fob
A security guard needs a list of who is allowed to access an area. What is this list called? Choices: AUP ACL Entry control roster Authorized personnel
Entry control roster
Which type of file specifies a map of network drives a user gets when logging on to a domain? Choices: Map file Batch file Login script Network mapping file
Login script
A client/server network which is a set of users, computers, security settings, and policies for an entire group within a company is known as a \_\_\_\_\_\_\_\_\_\_\_\_\_. Choices: HomeGroup domain private network workgroup
domain
Which tool is used to control rights and permissions throughout a domain? Choices: Administrative Tools Security Tools Windows Settings Group Policy
Group Policy
What best describes the main benefit of redirecting one's home folder in Active Directory? Choices: Save hard disk space on the server Setting up folders to be available offline Take control of storage and security of one's files on a network BranchCaching
Take control of storage and
security of one’s files on a network
Which best describes a software token? Choices: A code sent to a mobile device that is then needed for authentication The ability to visit multiple apps with a single sign-on A device with a numeric code that changes every60 seconds A certificate
A code sent to a mobile device
that is then needed for
authentication
Which MDM policy allows for users to use their personal mobile devices on a company network, subject to the company's approval? Choices: UYOD COPE BYOD CYOD
BYOD
Bydefault,which type of traffic should be blocked on a firewall? Choices: Inbound External Outbound Internal
Inbound
When is MAC filtering best used on a wireless network? Choices: To allow or deny specific devices on a network To limit the number of protocols which can conduct traffic To allow or deny specific protocols on a network To limit the number of devices on a network
To allow or deny specific devices
on a network
What stores keys that encrypt data so that two parties can have a secure exchange of data? Choices: CRL Certificates RootCAs Keyescrows
Certificates
Which is considered to be the most important maintenance task in antimalware software? Choices: Running a constant scan on data Running a scan on a regular basis Updating the software on a regular basis Updating the definitions on a regular basis
Updating the definitions on a
regular basis
Which are the two main ways in which a firewall controls traffic on a network? Choices: Ports Apps Users Protocols
Ports
Protocols
What is the minimum number of characters a password needs in order to be considered a strong password? Choices: 10 8 7 12
8
Which is not considered to be multifactor authentication? Choices: Password and smart card Username and smart card Username and password Password and biometrics
Username and password
A user needs to connect to a corporate network from a remote location. The connection needs to be secure. What kind of connection should be set up? Choices: RDP VPN SSL SSH
VPN
What should be set up on a network to prevent confidential data from leaking beyond a network? Choices: DLP Firewall IPS IDS
DLP
A permission list on a device, such as a router, is known as a/an \_\_\_\_\_\_\_\_. Choices: Rights List ACL Entry Control Roster Exceptions List
ACL
Which type of security device has a chip that stores user information for proper authentication to a physical area or device? Choices: Smart card Badge Key fob Fingerprint reader
Smart card
For the most efficient email filtering setup in a corporate environment, where should email filters be placed? Choices: On email servers On firewalls On client machines and email servers On client machines
On email servers
On a Windows device, what does Microsoft consider a trusted source for app installation? Choices: PlayStore Store Microsoft Store App Store
Microsoft Store
Which best describes the principle of least privilege? Choices: Users have write permissions on resources unless otherwise specified Users have no permissions on resources unless otherwise specified Users have permissions they need to perform their job tasks and no more Users have read-only permissions on resources unless otherwise specified
Users have permissions they
need to perform their job tasks
and no more
Which wireless encryption protocol should never be used to secure a wireless network? Choices: WPA2 WPA WEP WPS
WEP
Which wireless specification does not support TKIP? Choices: 802.11n 802.11ac 802.11g 802.11a
802.11n
Which is the most common use of single factor authentication used on wireless networks? Choices: None SSID and password SSID and username Username and password
SSID and password
What is usually needed for multifactor authentication on a wireless network? Choices: Biometrics Hardware token Authentication server One-time password key
Authentication server
A business wants to use the WPA2 Enterprise wireless protocol. In addition to a wireless access point, which type of server can help the business accomplish this goal? Choose two answers. Choices: Authorization server RADIUS Network policy server TACACS+
RADIUS
TACACS+
Which type of malware steals data and then demands money in order for the data to be returned? Choices: Keylogger Spyware Trojan Ransomware
Ransomware
A user downloaded an app that claimed to be a virus cleaner but in fact renamed a bunch of the user's system files. Which type of malware did the user obtain? Choices: Trojan Spyware Worm Virus
Trojan
A user claims a machine will not fully boot up. Upon troubleshooting, an administrator discovers that the master boot record has been infected. Which type of malware hit the machine? Choices: Virus Worm Trojan Rootkit
Rootkit
Which type of attack is common after an attacker steals data using a keylogger? Choices: Replay DoS Spyware Man-in-the-middle
Replay
Which legitimate data sources for websites can be used as spyware? Choices: Temp files Cookies Local storage JSON pairs
Cookies
Which is true about a virus? Choices: It can serve as an imposter app It self-replicates It often attacks the root of a system It needs a carrier in order to propagate
It needs a carrier in order to
propagate
Which type of malware does not need a carrier in order to propagate through a system? Choices: Trojan Worm Spyware Virus
Worm
A network of zombies carrying out a DDoS attack is known as a \_\_\_\_\_\_\_\_\_\_\_. Choices: gremlin bot herder botnet vector
botnet
In which version of Windows is Windows Defender strictly an antispyware app and not a full-fledged antivirus/antimalware app? Choices: Windows 7 Windows 8 Windows 8.1 Windows 10
Windows 7
Which mode is the best mode to be in to run an antimalware scan if malware is suspected on a device? Choices: Windows RE VGA Mode Safe Mode Command prompt
Safe Mode
In which edition of Windows did File History become the prominent backup and restore tool? Choices: Windows 7 Windows 8.1 Windows 8 Windows 10
Windows 10
Which method of mitigating malware risk is often overlooked but should not be overlooked? Choices: IDS End-user training IPS Firewalls
End-user training
Windows Firewall is known as a(n) \_\_\_\_\_\_\_ firewall. Choices: host-based IDS-based IPS-based network-based
host-based
Which DNS feature, when enabled, helps to protect against redirection attacks? Choices: Secure DNS DNSSEC Zone Protection DMZ
DNSSEC
A user shows an administrator an email that attempts to obtain the user's bank account information. Which type of social engineering has taken place? Choices: Impersonation Spear phishing Phishing Whaling
Phishing
The company CEO calls the help desk to explain that an email came through asking for the user’s Social Security number in order to take advantage of an
incredible financing offer. Which type of social engineering has taken place?
Choices:
Phishing
Spear phishing
Impersonation
Whaling
Spear phishing
Which is the best approach to take to avoid an impersonator entering a secure area of a building? Choices: Pretext the visitor Pair the visitor with an escort Ask for an ID from the visitor Have the visitor pre-register credentials
Ask for an ID from the visitor
A network attacker is hiding in an air duct and is able to see what an administrator is typing into a server. What form of social engineering is this? Choices: Shoulder surfing Keylogging Pretexting Phishing
Shoulder surfing
At the entrance to a building, an employee swipes a badge and then walks into the building. Before the door can close, another person sneaks into the
building behind the first person. What has taken place?
Choices:
Shoulder surfing
Piggybacking
Mantrapping
Tailgating
Tailgating
A potential attacker goes into a trash bin looking for confidential information. This act is known as \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. Choices: dumpster searching dumpster finding dumpster surfing dumpster diving
dumpster diving
Which two types of attacks flood a network with useless data packets, which in effect shut down a network as legitimate traffic cannot get through? Choices: Botnet DoS DDoS Zombie
DoS
DDoS
A user suspects a virus on the network. An administrator discovers that not only is a virus present but the antimalware software being used does not yet have a
fix for that virus. Which type of attack is taking place?
Choices:
DoS
Botnet
DDoS
Zero day
Zero day
Which type of attack involves intercepting data as it transmits between two parties? Choices: Man-in-the-middle Brute force DoS DDoS
Man-in-the-middle
Which are types of password attacks? Choose two answers. Choices: DDoS Brute force Rainbowtable Dictionary
Brute force
Dictionary
An attacker for a network has a table full of hashes. These hashes are being used to attempt to find matches in a network database in order to crack
passwords. Which type of table is the attacker using?
Choices:
MD5 table
SHAtable
Dictionarytable
Rainbowtable
Rainbowtable
A user notices a suspicious email from a coworker. Upon further investigation, the email administrator determines that the email did not come from the coworker. What has taken place? Choices: Phishing Spamming Impersonation Spoofing
Spoofing
Which two aspects of a system are often tested for compliance before being allowed on a network? Choices: Apps installed Antimalware app and definitions Desktop background Operating system installed
Antimalware app and definitions
Operating system installed
A computer has taken over several other computers in a network. These computers are now going to help carryout a DDoS attack. What are these computers known as during the attack? Choices: Botnets Zombies Accomplices Impersonators
Zombies
On a Windows device, which group of users have complete control over the device? Choices: Domain users Power users Administrators Super users
Administrators
Which best describes permissions power users possess on a Windows device? Choices: Permissions granted by administrators The ability to control other users' permissions Permissions to change other users' settings A specific set of permissions higher than standard users
A specific set of permissions
higher than standard users
Which is true regarding guest accounts on a Windows device? Choices: They can create files in other users' folders They can run software that is already installed They cannot access the Internet They can install software
They can run software that is
already installed
Which is true regarding standard accounts on a Windows device? Choices: They can change other users' usernames They can change other users' passwords They can install software for other users They can install software for themselves
They can install software for
themselves
The permission principle in which users and groups only receive permissions on resources when permissions are granted is known as \_\_\_\_\_\_\_\_\_\_\_. Choices: implicit allow implicit deny explicit allow explicit deny
implicit deny
A user copies a folder called Cases from the C: drive to the D: drive. The default permissions on the C: drive for the Users' group is Read and Write. The default permissions on the D: drive for the Users' group is Read. Users have Modify permission on the C:\Cases folder. What permission will the users have on D:\Cases? Choices: Read None Read and Write Modify
Read
Which file attribute sets a file to not be readable by others logging on to the same device? Choices: Hidden Compressed Archive Encrypted
Encrypted
By default, when permissions are set on a drive or folder, what happens to the permissions in any subfolders under that drive or folder? Choices: Permissions are reset to empty Permissions propagate down to the subfolders Permissions change back to the original permissions set on a system Permissions stay the same in the subfolders
Permissions propagate down to
the subfolders
Take a look at the permissions list on the Tech Notes folder. What is the significance of the gray check mark? Choices: Permissions will propagate down to any subfolders Permissions are inherited from the parent folder Permissions have been explicitly allowed Permissions have been explicitly denied
Permissions are inherited from
the parent folder
Where are system files and folders kept on a Windows device? Choices: C:\system32 C:\windows\system C:\system C:\windows\system32
C:\windows\system32
The help desk is getting an enormous amount of calls of users forgetting their passwords across multiple apps. What can be implemented to help stop this problem? Choices: Weaker passwords Smart cards Single sign-on One-time passwords
Single sign-on
A junior administrator is trying to run the sfc command via a command prompt but is getting a message indicating that an elevated command prompt is required. What should the junior administrator do? Choices: Run the command prompt as an administrator Run the command prompt with different credentials Run the command prompt with a sudo switch Log on as an administrator and run the command prompt
Run the command prompt as an
administrator
A user wants an entire hard drive encrypted on a laptop. Which Windows tool should be used to fulfill this request? Choices: EFSToGo BitLocker EFS BitLocker ToGo
BitLocker
A user wants an external hard drive encrypted. Which Windows tool should be used to fulfill this request? Choices: EFS To Go BitLocker BitLocker To Go EFS
BitLocker To Go
A user wants to make sure no one else logged on to a system can see the data in a specific folder. What can be added to the folder to make this happen? Choices: BitLocker To Go EFS To Go BitLocker EFS
EFS
An administrator wants to force users to log back on after a screen has been idle for a few minutes. What can the administrator set in order to enforce this wish? Choices: Screen saver password Time out password Sleep password Power on password
Screen saver password
Which two types of passwords are common BIOS passwords? Choices: Drive password Supervisor password Device password User password
Supervisor password
User password
What is required on a device in order for it to receive Remote Desktop connections? Choices: A VPN An open port 80 A password An IP address on the same subnet as the connecting device
A password
Which command is used to set the time ranges a user can log on to a device? Choices: net time net user net clock net logon
net user
Which built-in account should always be disabled unless it is absolutely needed? Choices: User Guest Power User Standard
Guest
Which account policy should be configured if an administrator wants to disable a user account after three consecutive failed logon attempts? Choices: Password Policy Group Policy Account Lockout Policy Local Security Policy
Account Lockout Policy
An administrator notices multiple users are forgetting to lock their screens when walking away from their computers. Which two areas of a device can an
administrator use to set a screen to lock after a certain amount of time?
Choices:
Lockout Policy
Group Policy
Screen Saver
Power Options
Screen Saver
Power Options
Configuring Administrator Accounts What should be changed on an administrator account in order to make the account more secure? Choices: Username Grouping Enabling Password
Password
When setting up accounts in Active Directory,which types of accounts are safe to set for a password never expiring? Choices: Administrator accounts User accounts Service accounts Guest accounts
Administrator accounts
Service accounts
When is it safe to delete a user account from Active Directory? Choices: Never When a user leaves a company When the account needs its permissions changed When data is no longer needed from that account
When data is no longer needed
from that account
When a user leaves a company,what is the best practice to followwith the user's account? Choices: Delete it Transfer it to someone else Disable it Archive it
Disable it
An administrator wants to lower the risk of having a CD or DVD spread malware within a network. Which two features can an administrator turn off to accomplish this wish? Choices: Autoinstall Autostart Autoplay Autorun
Autoplay
Which form of encryption is used to encrypt files and folders within Windows? Choices: EFS To Go BitLocker To Go BitLocker EFS
EFS
Which two statements best describe patches? Choices: A patch is a feature enhancement A patch is a feature update A patch is a fix to a feature that is notworking A patch is a fix to a security hole
A patch is a fix to a feature that is
notworking
A patch is a fix to a security hole
Which mobile device lock is considered to be the least secure lock? Choices: Swipe lock Fingerprint lock Passcode lock Face lock
Swipe lock
Which mobile device lock has security but no biometrics? Choices: Fingerprint lock Swipe lock Face lock Passcode lock
Passcode lock
A user loses a mobile device. Fortunately, the device is tracked and has been found. For security purposes, what should be done with the device next? Choices: It should be shut down It should be disabled It should be erased It should be restarted
It should be erased
What should be installed and enabled on a mobile device in order for the device to be found in case a user loses the device? Choices: Locator app Wipe software MDM GPS
Locator app
Which is the primary backup application used on iOS devices? Choices: iTunes iCloud iBackup Time Machine
iCloud
What is the default setting on many mobile devices after too many consecutive failed logon attempts? Choices: The device is disabled The device shuts down The device prompts the user for a new password The device is wiped
The device is wiped
Why are Android devices more prone to malware than that of iOS devices? Choices: Android is an open source operating system Android is a closed operating system Android has more app sources than does iOS Android has more apps than does iOS
Android is an open source
operating system
Which mobile device locks are biometric locks? Choose two answers. Choices: Fingerprint lock Face lock Passcode lock Swipe lock
Fingerprint lock
Face lock
When does full device encryption occur on an iOS device? Choices: When the full device encryption feature is enabled When a passcode is created When the Find my iPhone feature is enabled When a biometric lock is created
When a passcode is created
Which is an example of multifactor authentication on a mobile device? Choices: Username, password, and fingerprint Username and password Username and PIN Fingerprint and face reader
Username, password, and
fingerprint
Which type of applications provide temporary logon codes? Choices: Accounting apps Authenticator apps Key fob apps Authorization apps
Authenticator apps
Which mobile operating system must one jailbreak in order to install apps from untrusted sources? Choices: iOS Android Chrome OS Linux
iOS
A user has obtained an app that allows for controlling which apps move data in and out of a mobile device depending upon the type of connection a device
has. What type of program has the user obtained?
Choices:
IDS
Firewall
Port forwarder
IPS
Firewall
Which Microsoft tool is used to set and enforce requirements for a BYOD mobile device policy? Choices: MDM SCCM Azure Intune
Intune
Which two tools are effective in destroying a hard drive? Choices: Screwdriver Hammer Wrench Drill
Hammer
Drill
Which best describes the purpose of degaussing a hard drive? Choices: Destroys cylinders Destroys platters Destroys magnetic data Destroys the connectors
Destroys magnetic data
Which are two common methods of destroying paper data? Choices: Shredding Drilling Incineration Degaussing
Shredding
Incineration
What, in theory, proves that data has been destroyed properly? Choices: Broken hard drives Certificate of disposal Certificate of destruction Paper shreds
Certificate of destruction
When is low-level formatting typically done on a hard drive? Choices: When the drive needs to be filled with ones and zeros When the drive needs to be degaussed When the drive is manufactured When the drive needs to be erased
When the drive is manufactured
Which process rids a disk of any remnants of data? Choices: Low-level formatting Degaussing Overwriting Shredding
Overwriting
The process of drive wiping consists of performing multiple \_\_\_\_\_\_\_\_\_\_\_ on a drive. Choices: low-level formats shreds standard formats overwrites
overwrites
Which part of a wireless access point uniquely identifies a wireless network? Choices: Broadcast name WPS Serial number SSID
SSID
Which is considered to be the strongest encryption one can use to secure a wireless network? Choices: TKIP WPA WPA2 AES
AES
What can be done with an SSID to make a wireless network more secure? Choices: Disable the broadcast of it Hide it Change it Encrypt it
Disable the broadcast of it
A technician has a wireless access point to place in a small office in a single-story building. Where should the wireless access point be placed and how should the antennas be placed? Choices: Center of the room with the antennas set vertically Near the entrance with the antennas set horizontally Center of the room with the antennas set horizontally Near the entrance with the antennas set vertically
Center of the room with the
antennas set vertically
A single wireless access point is in a building. The owner wants to make sure the signal does not penetrate through to the outside of the building. What can a
technician do to keep the signal with the building?
Choices:
Lower the radio power level of the access point
Point the antennas horizontally
Move the access point to near an
entrance door
Use a 5GHzsignal
Lower the radio power level of the access point
Which type of attack is possible as a result of using WPS? Choices: Rainbow Man-in-the-middle Brute force Dictionary
Brute force
What information on a wireless access point is easilyobtained through an online search? Choices: Default WPSPIN Default encryption Default username and password Default SSID
Default username and password
A business owner wants to be very precise about which devices are allowed on a SOHO wireless network. Which method of security best fits this request? Choices: Lower the radio signal Disable SSID broadcast Enable MAC filtering Only run on the 2.4GHzfrequency
Enable MAC filtering
Which types of devices should get static IPaddresses on a network? Choose two answers. Choices: Client devices Printers Servers Mobile devices
Printers
Servers
Which type of firewall is sometimes present on wireless access points? Choices: IDS-based IPS-based Network-based Host-based
Network-based
A user wants to use a remote desktop connection to reach a specific device on a company network. If the user is to use the public IP address of the wireless
access point to connect, n so that the connection routes directly to the device?
Choices:
Port triggering
NAT
PAT
Port forwarding
Port forwarding
On a wireless access point, what should be done with ports that have no specific purpose for traffic? Choices: Reassign them Remove them Block them Disable them
Disable them
What is an administrator most likely to use to filter out websites that should be off-limits to company users? Choices: Domains Keywords URLs Proxy servers
Keywords
What should be checked on a wireless access point occasionally for possible upgrades? Choices: Software Firmware Encryption Speeds
Firmware
Which is the most ideal location for a wireless access point if the wireless signal is to cover an entire room? Choices: In the center of the room, near the ground On top of a cabinet In the center of the room, above the ground On top of a doorway
In the center of the room, above
the ground
A user is reporting slow performance on a desktop computer. Where should a technician check first to start to diagnose the problem? Choices: Performance Monitor Task Manager Windows Memory Diagnostics Resource Monitor
Task Manager
Which command should a technician run to attempt to diagnose an intermittent connectivity problem a user is reporting? Choices: nslookup tracert ping netstat
netstat
A user cannot complete a boot to Windows and a technician has ruled out a hardware failure. The technician gets a message that the BOOTMGR is missing. Which command should the technician run? Choices: bootrec /fixmbr bootrec /fixmgr bootrec /rebuildcd bootrec /fixboot
bootrec /rebuildcd
Upon attempting to boot a Windows device, a user is reporting that a message appears stating that the operating system is missing. What are the two most likely causes of this problem? Choices: A bad Master Boot Record A missing boot sector The hard drive has failed An incomplete Windows installation
A missing boot sector
A bad Master Boot Record
A user reports an application keeps crashing. What should a technician do first to try to solve the problem? Choices: Upgrade the app Uninstall and reinstall the app Repair the app installation Look at the Event Viewer for errors
Look at the Event Viewer for errors
What do stop errors start with when a BSoD appears? Choices: 3x 2x 1x 0x
0x
A user reports a black screen when starting up a computer. A technician has ruled out a hardware issue. What should the technician do next? Choices: Reset the monitor resolution Plug in a different monitor Change the video card Reboot into VGA mode or Safe Mode
Reboot into VGA mode or Safe
Mode
What type of IP address should printers have? Choices: Private Dynamic APIPA Static
Static
While troubleshooting, a technician notices a service has failed to start. The service is set to start automatically. What should the technician next check for while in the Services window? Choices: If the service is disabled If there are error messages present If a dependency failed to start If the startup options changed
If a dependency failed to start
A user claims a device takes forever to boot up. What should the technician look to do first to try to speed up the boot process? Choices: Uninstall unnecessary apps Clear disk space Reduce the number of apps that start up Add RAM
Reduce the number of apps that
start up
Several users are reporting that a profile is taking too long to load. What can be done on their local devices to attempt to solve this problem? Choose two answers. Choices: Clean out the Cookies folder Clean out the Startup folder Point the WAN link at a different server Clean out the Temporary Internet Files folder
Clean out the Cookies folder
Clean out the Startup folder
A technician had to reboot a frozen system. After the reboot, where should the technician look to try to figure out what caused the system to lock up in the first place? Choices: System log in System Information Applications log in Event Viewer Applications log in System Information System log in Event Viewer
System log in Event Viewer
A technician suspects a task is taking up all of a device's CPU. What should the technician use to end the task? Choices: Explorer Task Manager Resource Monitor Event Viewer
Task Manager
ADHCP server is up and running and the IP address pool has plenty of addresses remaining, but users who recently logged on to the network are complaining about not getting assigned an IP address. What should the technician do first to try to solve the problem? Choices: Have the users reboot their machines End all current IP address leases Restart the DHCP server Restart the DHCP service
Restart the DHCP service
A technician needs to reinstall Windows on a device but wants to keep a user's personal files on the device. The technician will be using a previously saved image as a source for the new installation. What should the technician do with the user's files? Choices: Run the install and just fix the bad system files Back them up Run the install and choose the upgrade option Leave them and use the Reset option when reinstalling Windows
Back them up
A user is reporting that the latest Windows Update on a device is causing instability on the device. What should a technician do first to attempt to solve the problem? Choices: Uninstall the latest update Reinstall Windows Look for another update Reset Windows
Uninstall the latest update
A user is reporting that a driver update to a video card is causing display problems on a device. Where can a technician go to roll back a driver update? Choices: Programs and Features Computer Management Device Manager System Information
Device Manager
Which updates are considered to be the most important updates to apply on a device? Choices: Firmware updates Security updates Driver updates Feature updates
Security updates
Where in the Control Panel can one go to attempt to repair an app installation? Choices: Programs and Features Apps Default Apps Settings
Programs and Features
Where on a system should a technician go in order to change the boot order on a device? Choices: Safe Mode Task Manager Msconfig BIOS
BIOS
In Windows 10, which tool is used to disable an application from starting up? Choices: Programs and Features Msconfig Services Task Manager
Task Manager
A technician needs to reboot a device into Safe Mode in order to run a malware scan. Which tool can the technician use to set this while Windows is running? Choices: Windows RE Msconfig Windows PE Task Manager
Msconfig
A user reports that a message indicating a user profile cannot be loaded when a system starts up. What should a technician do to solve this problem? Choices: Restore a backup of the user profile Rebuild the user account Reset Windows Rebuild the user profile
Rebuild the user profile
Where can a technician ensure, in Internet Options, that pop-ups are being blocked? Choices: Security tab Connections tab Advanced tab Privacy tab
Privacy tab
Users are complaining that when attempting to navigate to one website, they get redirected to another website. What has most likely been compromised? Choices: A DNS server The users' homepage settings The default gateway A DHCP server
A DNS server
A user is claiming that an antimalware app is frequently popping up with security alerts. Where should a technician look to see if these alerts are legitimate? Choices: Event Viewer The antimalware app's log The antimalware app's website The antimalware app's history
Event Viewer
A user is reporting that the user's PC performance is suffering a significant slowdown. What should a technician do first to try to solve the problem? Choices: Look at System Configuration Run the antimalware app on the user's PC Look at Task Manager Boot into Safe Mode
Look at Task Manager
Which command can check a network card for any abnormalities in network connections? Choices: route ipconfig /all tracert ping
ipconfig /all
A user reports that a PC keeps locking up. The Event Viewer is not presenting any consistent reasons for the lockups. What should an administrator start monitoring? Choices: Resource manager PC temperature Apps running Device manager
PC temperature
A user reports that an app keeps crashing. What should a technician do first to try to solve the problem? Choices: Upgrade the app Reinstall the app Check the log in the app folder Check the Event Viewer
Check the Event Viewer
A Windows Update has failed multiple times on a device. What should a technician do next to try to get the update to work? Choices: Run the update manually Run the update troubleshooter Delete the update and download it again Wait for the next update to come out
Run the update troubleshooter
A rogue antivirus app is technically which form of malware? Choices: Trojan horse Spyware Virus Worm
Trojan horse
Which best defines spam? Choices: Unwanted email Unwanted IM messages Unwanted voicemail Unwanted SMS messages
Unwanted email
Which three events on a system indicate probable malware and a need to rerun the Windows installation process? Choices: File permission changes Spam Disappearing files Pop-up ads Renamed system files
Disappearing files
Pop-up ads
Renamed system files
A user is getting a Run DLL Access Denied error message randomly on a device. What is likely happening on the device? Choices: Permissions are being denied for an app action The UAC is notworking on the device Malware is trying to install something on the device An app needs to be reinstalled
Malware is trying to install
something on the device
A user is being informed that a certificate used for conducting transactions has expired. What should be done to rectify the problem? Choices: The user should renew the current certificate The user should obtain a new certificate The user should generate a new certificate The user should extend the current certificate
Where are system and application logs kept on a Windows device? Choices: System Information Event Viewer Computer Management Device Manager
Event Viewer
Place the steps for malware removal in the proper order. Choices: Remediate the infected systems Quarantine the infected systems Disable System Restore Enable System Restore and create a restore point Educate the end user Schedule scans and run updates Identify and research malware symptoms
1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore 4. Remediate the infected systems 5. Schedule scans and run updates 6. Enable System Restore and create a restore point 7. Educate the end user
A technician has determined that malware is present on a device. What should the technician do next? Choices: Disable System Restore Remediate the infected system Update the antimalware software Quarantine the infected system
Quarantine the infected system
Why is it important to disable System Restore before remediating a system from malware? Choices: This quarantines the system This prevents the system from rolling back to a point where malware maybe present System Restore needs a network connection This speeds up the remediation process
This prevents the system from
rolling back to a point where
malware maybe present
A system has had System Restore disabled and a technician is ready to begin the process of remediation from malware. What should the technician do first? Choices: Update the antimalware software Upgrade the antimalware software Boot into Safe Mode Boot into Windows PE
Update the antimalware software
What is the recommended state of Windows for running an antimalware scan if a system has been found to have malware? Choices: Windows PE Windows RE Safe Mode Normal Mode
Safe Mode
What should be done in System Restore after a device has been remediated from malware? Choose two answers. Choices: Create a restore point Enable System Restore Clear all restore points Disable System Restore
A user brings a technician a tablet that has a very dim display. What should the technician do first to troubleshoot the problem? Choices: Restart the tablet Increase the display contrast Increase the display brightness Move the tablet to a brighter area
Increase the display brightness
A user is complaining about a wireless connection that keeps going in and out. What is the most likely cause of this? Choices: Oversaturation of bandwidth Being on an incorrect wireless frequency Interference from other devices Being too far from a warless access point
Interference from other devices
A user is stating that a device cannot get a wireless connection. What should a technician do first to diagnose the problem? Choices: Reboot the user's device See if others can connect to the wireless access point Try to connect to the wireless access point Reboot the default gateway
See if others can connect to the
wireless access point
A user cannot pair two devices that have previously been paired using Bluetooth. What should a technician do first to try to solve the problem? Choices: Restart both of the devices Ensure that the two devices are within 30 feet of each other Ensure Bluetooth is running on both devices Re-pair the devices
Ensure Bluetooth is running on
both devices
A user has a Windows laptop that is not projecting to an external monitor. Which two possible solutions can a technician try first to solve the problem? Choices: Plug in a different monitor Replace the video card on the laptop Use the Windows logo + Pkey combination to cycle through the different display combinations Use the toggle button on the laptop keyboard to toggle through the different display combinations
Use the Windows logo + Pkey combination to cycle through the different display combinations Use the toggle button on the laptop keyboard to toggle through the different display combinations
A user is stating that a touch screen on a tablet has become unresponsive. What should a technician do first to try to solve the problem? Choices: Calibrate the screen Force a restart on the tablet Reset the tablet If a covering is on the screen, remove it
If a covering is on the screen,
remove it
A user is claiming that an app on a mobile device is not loading properly. What should a technician do first to try to rectify the issue? Choices: Update the app Clear the app cache Do a force stop on the app Uninstall and reinstall the app
Do a force stop on the app
A user is reporting that a mobile device that usually runs quickly is now running slowly. What should a technician do first to try to get the device to run at a faster speed? Choices: Switch to Wi-Fi only Switch to cellular data Uninstall unnecessary apps Close unnecessary apps
Close unnecessary apps
What is needed on a mobile device in order to decrypt encrypted email? Choices: A signature A passcode A certificate A PIN
A certificate
Which are two ways to preserve battery life on a mobile device? Choices: Set the brightness to use automatic brightness Make sure the device is holding a charge Use cellular data as much as possible Use location services only on apps that need to use the feature
A user's mobile device is overheating. What should be done with the device to cool it off? Choose two answers. Choices: Put the device in a fridge Replace the battery Turn off the automatic brightness setting Remove the protective case temporarily
Turn off the automatic brightness
setting
Remove the protective case
temporarily
A user brings a technician a mobile device that is frozen. Which two steps should a technician try first to attempt to fix the problem? Choices: Pull the battery out and then put it back in Perform a soft reset Replace the battery Perform a hard reset
Pull the battery out and then put it
back in
Perform a soft reset
A user is claiming that a mobile device has no sound going through its speakers. What should a technician check first? Choices: Bluetooth volume Ringer settings Speaker volume App settings
Speaker volume
A user is claiming that the touch screen on a mobile device is inaccurate to the touch. What should be done first on the device in order to attempt to fix the issue? Choices: Plug in a mouse Install a calibration app Reset the device Perform a soft reset
Install a calibration app
A user reports that a system lockout has occurred on the user's mobile device. What is the most likely cause of the system lockout? Choices: User tried to do a hard reset The device was reported as missing User forgot a passcode too many times User tried to do a soft reset
User forgot a passcode too many
times
What is typically needed to view app log errors from an iOS or Android device? Choices: A log cloud service A rooted device A mobile app that reads logs A desktop or laptop
A desktop or laptop
Which device can a business obtain if thick walls in a building are causing cellular signals to be weak? Choices: Switch Bridge Router Repeater
Repeater
Which are two ways in which a user can avoid a fast drain of power on a mobile device? Choices: Use cellular data as much as possible Put the device in airplane mode when possible Use Wi-Fi as much as possible Close apps that are not needed
Use Wi-Fi as much as possible
Close apps that are not needed
A user is experiencing a slowdown of speed on a mobile device's cellular connection in an area in which speeds are usually fast. The Wi-Fi connection speeds are fine. What can cause this problem? Choices: The wireless connection is taking up the overall bandwidth A nearby tower is down The user exceeded the data plan for the device The user is in a heavy traffic area
The user exceeded the data plan
for the device
On this iPad, which setting controls whether or not this device will have unintended Wi-Fi connections? Choices: The info icon next to LearnKey5 Control Center Ask to Join Networks General
Ask to Join Networks
Which is the best way to avoid unintended Bluetooth pairings? Choices: Put Bluetooth in private mode Change the discoverable setting to off Change the name of the device Turn Bluetooth off if not using it
Turn Bluetooth off if not using it
What can a user on a mobile device do to protect data being sent to and from the cloud? Choices: Use encryption Add a hash to the data Use a VPN Add a digital signature to the data
Use encryption
What usually happens when a user exceeds a monthly data plan on a mobile device? Choices: Cellular data service is turned off Personal hotspots are turned off Data is throttled for the remainder of the billing period Extra charges are incurred
Data is throttled for the remainder
of the billing period
If a user suspects that someone has gotten ahold of the account used on a mobile device, what should the user do right away? Choices: Change the account being used on the mobile device Enable multifactor authentication on the mobile device Wipe the device Change the password for the account being used on the mobile device
Change the password for the
account being used on the mobile
device
Which is an efficient way of avoiding unauthorized location tracking on a mobile device? Choices: Enable location tracking only while the device is moving Enable location tracking only when the device is away from the home location Turn off location tracking Turn off location tracking for apps to where one does not need location tracking
Turn off location tracking for apps
to where one does not need
location tracking
Which is the best way to avoid unauthorized camera and microphone use on a mobile device? Choices: Turn off the two features for apps that do not need them Turn the mic volume all the way down Turn off the two features unless they are absolutely needed Turn the camera brightness all the way off
Turn off the two features for apps
that do not need them
On an iPad, what cannot be checked for usage without a third-party app? Choices: Apps that use cellular data RAM usage Running apps Storage usage
RAM usage
Which two types of network diagrams are best suited for explaining the overall infrastructure of a network? Choices: Public Private Logical Physical
Logical
Physical
What should businesses build up to use to help solve end-user problems? Choices: Compliance documentation Knowledge base Incident documentation Network topology
Knowledge base
Which best describes incident documentation? Choices: Documenting help desk tickets Documenting security breaches Documenting customer interactions Documenting knowledge base entries
Which best describes the difference between a regulatory policy and a compliance policy? Choices: A compliance policy follows recommended courses of action A regulatory policy is more specific and a compliance policy is more comprehensive A regulatory policy is more comprehensive and a compliance policy is more specific A compliance policy follows official legal standards
A regulatory policy is more specific
and a compliance policy is more
comprehensive
Which document governs the use of the devices within a company? Choices: PII MSDS GDPR AUP
AUP
Which items should be included in a password policy? Choose two answers. Choices: Password length rules Password hash techniques Password attack prevention techniques Password complexity rules
Password length rules
Password complexity rules
Which are the two most common methods used on devices to manage a company's IT inventory? Choices: Excel documents Asset tags Lease tags Barcodes
Asset tags
Barcodes
Which document is needed throughout the process of managing change in an IT infrastructure? Choices: Change management form Change control form Change approval form Change request form
Change control form
Which part of the change management process is absolutely vital to seeing if a change is worth making? Choices: Risk analysis Purpose Process Scope
Purpose
Which best defines scope creep on a project? Choices: Unauthorized deletions from the scope Unauthorized budgeting for the scope Unauthorized additions to the scope Unauthorized changes to the scope
Unauthorized changes to the
scope
Which type of risk analysis establishes an amount of lost time or lost money should a risk become reality? Choices: Monetary risk analysis Value risk analysis Qualitative risk analysis Quantitative risk analysis
Quantitative risk analysis
What do end users need to know in a change management plan? Choices: The time it will take to plan the change The effect the change will have on them The amount a project will cost The time it will take to design the change
The effect the change will have on them
From which group of people must a project manager get acceptance as part of change management? Choices: Management End users Owners Stakeholders
End users
Which group of people evaluate a change request, weigh its merits, help with risk analysis, and ultimately decide whether a change goes forward? Choices: Upper management Change control board End-users Project managers
Change control board
What is needed as part of a change control process to address the possible failure of a change? Choices: A backout plan A contingency plan A contingency budget A scope change request process
A backout plan
Which types of software are usually used to document changes as they are taking place in the context of a project? Choose two answers. Choices: OneNote files Databases Project management software Word documents
Databases
Project management software
Which tool is used on a Windows 10 device to create a system image for backup purposes? Choices: Backup and Restore File History System Restore Image Backup
Backup and Restore
Where is the best place to have backups of critical applications in case they are needed for disaster recovery? Choices: On a system image In the cloud On an external drive On a network share
Which is the most efficient way to test a backup to make sure it is working? Choices: Delete a file and then perform a restore Check the date of the last backup Attempt to restore files from the backup Write files directly to the backup drive
Which best describes the use of a UPS? Choices: A short-term solution for a power outage A protector against brownouts A protector against surges and spikes A long-term solution for a power outage
A short-term solution for a power
outage
What do surge protectors protect against besides surges? Choices: Brownouts Spikes Grounding issues Blackouts
Spikes
Which are options for both local and cloud storage? Choose two answers. Choices: BranchCache OneDrive SyncCenter Dropbox
OneDrive
Dropbox
A domain administrator needs to recover data from a deleted account, which has been backed up in Active Directory. Which tool should the administrator use to restore the account data? Choices: The ntdsutil command File History Backup and Restore The adbackup command
The ntdsutil command
Which type of equipment should one never attempt to repair? Choices: Hard drive DC jack Power supply Motherboard
Power supply
What should a video card be stored in if it is not in a machine? Choices: ESD bag Styrofoam case Antistatic bag Faraday bag
Antistatic bag
Which two devices can help a technician avoid electrostatic discharge while working on a device? Choices: ESD strap ESD foam ESD mat ESD bag
ESD strap
ESD mat
Which best describes the act of self-grounding while working on the inside of a computer? Choices: Stand on an ESD mat Touch metal in the case occasionally Sit on an ESD mat Touch the outside of the case occasionally
Touch metal in the case
occasionally
Which three objects should never be thrown away as they have dangerous chemicals in them? Choices: CRTs Toner Paper Batteries Trash cans
CRTs
Toner
Batteries
An administrator is going to take old cell phones and tablets to a company’s cell phone carrier for the purpose of recycling the devices. What should be done
with the devices before the yare brought back for recycling?
Choices:
Destroy them
Restore these to factory settings
Remove the batteries
Remove the SIM cards
Restore these to factory settings
What should absolutely be done with a PC before attempting to repair it? Choices: Ground the case Unplug it Power it off Remove the power supply
Unplug it
What should not be worn while working on a PC? Choose two answers. Choices: Rings Neckties Dangling jewelry Flannel shirts
Which statements regarding lifting heavy objects are true? Choose two answers. Choices: Lift with your legs Lift with your arms Use a cart when needed It is okay to lift something very heavy if lifting properly
Lift with your legs
Use a cart when needed
Which label should be on a fire extinguisher in order for it to be used on electrical fires? Choices: A B D C
C
How many power strips are acceptable for use for daisy chaining? Choices: 0 4 2 3
0
Which two devices should be used for working with either sharp objects or objects that emit an odor? Choices: Gloves Air filter mask Safety goggles Earplugs
Air filter mask
Safety goggles
Which document should be provided for every potentially hazardous material on company premises? Choices: MSDS PSDS MUP AUP
MSDS
What is the ideal humidity percentage in a server room? Choices: 20% 35% 50% 65%
50%
Which device is a short-term power solution in case of a blackout? Choices: Generator Surge suppressor UPS Surge protector
UPS
What is the main role of a surge suppressor? Choices: Protect against sags Protect against short-term power bursts Protect against sharp increases in voltage Protect against brownouts
Which two items, when placed in working areas, can help protect the areas from airborne particles? Choices: Air filters Cooling fans Air masks Enclosures
Air filters
Enclosures
Which two items can help keep computers and other equipment free from dust and debris? Choices: Cleaning solvents Compressed air cans ESD vacuums Cloths
Compressed air cans
ESD vacuums
What is the most important aspect of safety procedures to follow when working with equipment and disposing of toxic material? Choices: Compliance with OSHA Compliance with government regulations Compliance with MSDS sheets Compliance with manufacturer standards
Compliance with government
regulations
Which is the first step in an incident response process? Choices: Start a chain of custody Send a report to the CIO Identify whether an incident took place Preserve data related to the incident
Identify whether an incident took
place
An incident response specialist has determined that a security breach has taken place. Which are the next two steps in the incident response process? Choices: Call law enforcement Start a chain of custody Report the incident to the proper authorities Preserve data related to the incident
Which document proves that evidence has been properly monitored during an incident response process? Choices: Chain of custody Evidential gathering Certificate of custody AUP
Chain of custody
Which statements are true regarding open source and commercial licenses? Choose two answers. Choices: Open source licenses are common in Linux Open source licenses are always enterprise licenses Commercial licenses are always personal licenses Commercial licenses have strict rules as to how the licenses can be used
Commercial licenses have strict rules as to how the licenses can be used Open source licenses are common in Linux
Which is true regarding personal and enterprise licenses? Choose two answers. Choices: Personal licenses are always limited to a set number of installations Enterprise licenses often have more features than that of personal licenses Personal licenses are always limited to a single device per person Enterprise licenses always have a limit as to how many devices are included in the license
A person's address, vehicle information, and Social Security number are all examples of which type of information? Choices: PHI PEI PCI SPI
SPI
Which standards apply to businesses that accept debit cards, credit cards, and ATM cards for payments? Choices: PCIDSS GDPR PII GLB
PCIDSS
From where does GDPR originate? Choices: Asia North America EU Africa
EU
Which act does PHI apply to? Choices: Sarbanes-Oxley GLB GDPR HIPAA
HIPAA
Who is ultimately responsible for security within a corporate infrastructure? Choices: IT Everyone Upper management CTO
Everyone
A technician is going to increase the RAM from 4GBto 8GBin a customer's system. What is the best statement a technician could use to explain this to a customer? Choices: I'm going to double the memory in your computer Your computer will be able to process instructions twice as fast as before I'm going to install 8GBof PC12800 triple-channel memory I'm going to fill your empty RAM slot with 4GBofRAM
I’m going to double the memory in your computer
A customer brings in a Mac and wants a Blu-ray drive installed. A technician is not familiar with how this is done on a Mac, but another technician is. What should the technician tell the customer? Choices: Come back when the Mac tech is here There is a Mac store down the street I don't really work on Macs I don't work on Macs much, but I know someone who does and between the two of us, we will get this done
I don’t work on Macs much, but I
know someone who does and
between the two of us, we will get
this done
Which best describes active listening? Choices: Getting closer to the person so that one can hear the person Interrupting someone for clarification Asking a lot of questions Letting someone finish a thought
Letting someone finish a thought
A technician is working on a computer for a doctor. How should the technician address the doctor when talking to the doctor? Choices: Dr. and the last name Mr., Ms., Miss, or Mrs. and the name Using a nickname On a first-name basis
Dr. and the last name
A technician is stuck on a house call and is going to be late for the next appointment, a small business. What should the technician do? Choices: Call the small business to let them know the technician will be late Nothing. Business as usual Leave the house call, take care of the small business, and come back to the house call Apologize to the small business when the technician gets there
Call the small business to let
them know the technician will be
late
Which are types of distractions that should be avoided while dealing with customers? Choose three answers. Choices: Looking for parts for a customer Texting Personal calls and interruptions Talking to coworkers Looking up solutions online
Texting
Personal calls and interruptions
Talking to coworkers
Which is the best technique to use when dealing with an argumentative customer? Choices: Point out where the customer is wrong Use a soft voice Argue back Be firm but point out facts
Use a soft voice
What two aspects of conversation should a technician avoid when dealing with customer problems? Choices: Drawing information out from the customer Dismissing the customer problems Being judgmental Setting customer expectations
Which types of questions are the best types of questions to ask customers when trying to ascertain a problem? Choices: Closed-ended questions Open-ended questions Yes/no questions Multiple choice questions
Open-ended questions
Where should one never disclose experiences with customers? Choices: To social media To other coworkers To an internal website To an internal tracking app
To social media
A technician tells a customer that 16 GB of RAM will be added to a device. Then, the technician realizes that only 8 GB of RAM is possible as the device is older. What should the technician tell the customer? Choices: Apologize but explain the the device can only hold 8 GB more of RAM and add a complimentary extra service The customer should get a new device The technician can only put an additional 8 GB of RAM in the device Apologize but explain that no RAM can be added to the device
Apologize but explain the the
device can only hold 8 GB more of RAM and add a complimentary
extra service
Which are considered best practices for customer service at the end of a transaction and after the transaction? Choose two answers. Choices: Ask the customer to post an online review Follow up with the customer's supervisor a few days later Follow up with the customer a few days later Provide detailed documentation for services provided
Provide detailed documentation
for services provided
Follow up with the customer a few
days later
What should a technician do with confidential data at a client site if the data is easy to see? Choices: Avoid looking at the data Let the client know the data was seen Ask the client to move the data Report to a supervisor that the data was seen
Ask the client to move the data
Which type of script file is used in command prompts and for logon scripts and is built in Notepad? Choices: .vbs .ps1 .sh .bat
.bat
Which type of script perform actions through distinct verb-noun commands? Choices: .bat .ps1 .sh .vbs
.ps1
Which type of script file is often used to run Windows processes? Choices: .vbs .sh .bat .ps1
.vbs
Which type of script file is the Linux equivalent of a batch file in Windows? Choices: .py .bash .sh .vim
.sh
Which type of script file is used in conjunction with a multipurpose object-oriented programming language? Choices: .py .bat .js .ps1
.py
Which type of script file represents an object-oriented programming language used mainly on webpages? Choices: .bash .py .js .ps1
.js
What are the two main purposes for comments in code?
Choices:
To help explain code
To help test code
To indicate what language code is
in
To tell a server-side engine how to process code
To help explain code
To help test code
Which best describes, in programming terms, a loop? Choices: A set of instructions that repeats once A conditional statement A test of code, followed byrunning code in production A block of code runs a set number of times
A block of code runs a set number of times
Programming statements such as x= 5 and y= 7 are examples of \_\_\_\_\_\_\_\_\_\_\_. Choices: strings variables integers Booleans
variables
Which is true about integers and strings in programming? Choose two answers. Choices: Integers are set inside of quotation marks Integers are whole numbers Numbers in strings can be used in calculations Strings can be whole numbers
Strings can be whole numbers
Integers are whole numbers
On which port does RDP run? Choices: 3389 636 389 1024
3389
Which port uses SSH to connect one device to another? Choices: 21 22 23 20
22
Which is an example of an app that does both screen sharing and file sharing? Choices: Skype for Business Remote Desktop SSH PuTTY
Skype for Business
Why should Telnet not be used to connect one device to another? Choices: It is not secure It sends data in plaintext It only works in half duplex It is an outdated connection method
It is not secure