ExamTopics Practice Questions Flashcards

1
Q

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.
Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

a) Reinstall the application
b) Roll back the application to the earlier version
c) Clear the application cache
d) Update the OS of the smartphones

A

d) Update the OS of the smartphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Choose two.)

a) dir
b) chkdsk
c) dism
d) ipconfig
e) format
f) diskpart

A

b) chkdsk
c) dism

b) chkdsk: This command is used to check and fix disk errors. Running chkdsk can help improve system performance if the system is running slowly due to disk errors or bad sectors.
c) dism: The DISM (Deployment Imaging Service and Management Tool) command can be used to repair and restore the health of the system image, which can help improve system performance if the issue is related to corrupted system files or settings.

*Why the other options are incorrect:
a) dir: This command is used to display the contents of a directory. It doesn’t help with performance issues.

d) ipconfig: This command displays network configuration details and can be useful for network troubleshooting, but it won’t fix performance issues related to a slow system.

e) format: This command is used to format a disk or drive, which would erase all data on the drive. It’s a drastic measure and not typically used to resolve performance issues unless you’re planning to reinstall Windows from scratch.

f) diskpart: This is a disk partitioning tool. While useful for disk management tasks (e.g., creating, deleting, or resizing partitions), it is not specifically used to address system performance issues.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An administrator is setting up a Windows terminal server.
Which of the following settings should the administrator modify to increase server security? (Choose two.)

A. Change the default access port
B. Enforce password complexity
C. Put the terminal server into the router’s DMZ
D. Disable logon time restrictions
E. Block all unused ports on the LAN smart switch
F. Use the local client certificate for server authentication

A

A. Change the default access port
B. Enforce password complexity

*A. Change the default access port: By default, Terminal Services (RDP) uses port 3389. Changing this to a non-standard port can help reduce the chances of automated attacks that specifically target the default port. While this won’t completely secure the server, it adds an additional layer of obfuscation.

B. Enforce password complexity: Enforcing password complexity requirements (e.g., a mix of upper and lowercase letters, numbers, and special characters) is an important security measure. It ensures that users choose strong passwords, which can help protect against unauthorized access to the terminal server.

Why the other options are less relevant:
C. Put the terminal server into the router’s DMZ: Placing the terminal server in the DMZ may expose it to more risks, as the DMZ is often a less secure area meant for public-facing services. A better approach would be to secure the terminal server with proper firewall rules and VPN access, not to expose it more directly.

D. Disable logon time restrictions: While logon time restrictions may be useful for controlling access during certain times, disabling them is unlikely to improve security. In fact, enabling time-based restrictions could enhance security by limiting when users can log on.

E. Block all unused ports on the LAN smart switch: While blocking unused ports is generally good practice for securing the network, this measure is more related to physical network security. It’s useful in preventing unauthorized devices from connecting but does not directly improve the security of the terminal server itself.

F. Use the local client certificate for server authentication: This option refers to certificate-based authentication for securing communication between clients and the server. While using certificates can enhance security, it’s not directly about increasing server security in this case, as the main concern here seems to be securing the server’s access and user credentials.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?

A. Telnet
B. SSH
C. RDP
D. VNC

A

B. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)

A. Guest network
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP

A

C. Default login
E. WPS

*key word: PIN for WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following provide the BEST security for a server room? (Choose two.)

A. Badge reader
B. Bollard
C. Biometric lock
D. Cable lock
E. USB token
F. Privacy window shades

A

A. Badge reader
C. Biometric lock

*A. Badge reader: A badge reader provides physical security by requiring authorized personnel to swipe or scan a badge to gain access to the server room. This helps ensure that only authorized users can enter the space, offering a layer of access control.

C. Biometric lock: A biometric lock enhances security by using unique physical characteristics (like fingerprints or retina scans) to verify the identity of individuals. This provides a very high level of access control, as biometrics are difficult to replicate or bypass.

Why the other options are less effective for server room security:
B. Bollard: Bollards are typically used to prevent vehicle access or damage to buildings. While useful for protecting the exterior of a facility, they don’t directly enhance the security of the server room itself.

D. Cable lock: Cable locks are used to secure devices (like laptops or external hard drives) to desks or stationary objects. They are effective for device security, but do not provide meaningful protection for securing a server room or controlling access to it.

E. USB token: A USB token is typically used for authentication in remote systems, especially for logging into systems via two-factor authentication. While it’s a useful authentication tool, it doesn’t help with physical security of the server room itself.

F. Privacy window shades: Privacy window shades can prevent outsiders from seeing into the server room, but they don’t significantly contribute to access control or physical security. The server room should be secured through controlled access mechanisms, not just visual obfuscation.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following threats uses personalized information in an attempt at obtaining information?

A. Whaling
B. Impersonation
C. Spoofing
D. Spear phishing

A

D. Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?

A. Date and time
B. UEFI boot mode
C. Logon times
D. User access control

A

A. Date and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.
Which of the following Control Panel utilities should the technician use to configure the setting?

A. Internet Options Advanced
B. Internet Options Connections
C. Internet Options Security
D. Internet Options Content
E. Internet Options Privacy

A

B. Internet Options Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

A. 2GB
B. 4GB
C. 8GB
D. 16GB

A

B. 4GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.
Which of the following is the BEST choice for the technician to make?

A. Politely ask the user to call back
B. Ask another technician to take the call
C. Troubleshoot the issue for the user
D. Input the issue as a ticket and escalate to Tier 2
E. Put the user on hold and troubleshoot after the scheduled break

A

B. Ask another technician to take the call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)

A. UPS
B. Server rack
C. PoE phone
D. Desktop printer
E. Modem
F. Patch panel

A

A. UPS
B. Server rack

UPS and the server rack has multiple connected to it therefore needs to remain grounded due to high power usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.
Which of the following is MOST likely causing this error?

A. The computer has GRUB Legacy installed
B. Windows Startup services are not running
C. An incompatible partition is marked as active
D. An unsupported version of Windows is installed

A

C. An incompatible partition is marked as active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is installing a private PC in a public workspace.
Which of the following password practices should the technician implement on the PC to secure network access?

A. Remove the guest account from the administrators group
B. Disable single sign-on
C. Issue a default strong password for all users
D. Require authentication on wake-up

A

D. Require authentication on wake-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.
Which of the following is the FIRST option to check?

A. Visit the Microsoft Update website to see if there is an issue with a specific update
B. Look up the error number associated with the failed update
C. Look at the system Event Viewer to find more information on the failure
D. Download the failed update to install manually

A

B. Look up the error number associated with the failed update

If an automated system update fails to install, you should research the error number for the failed update to determine if the issue is a known error. Based on the error code, you can then determine the best method to overcome the issue. For example, a common cause of errors is inadequate space on the hard disk. If a technician needs to determine how to best solve this issue, researching the error code at Microsoft.com can help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.
Which of the following Control Panel utilities should the technician use?

A. System
B. Display
C. Folder Options
D. Indexing Options

A

C. Folder Options

*The Folder Options utility in Control Panel allows you to modify the settings for file visibility and how files are displayed in Windows. In this case, the .dll file might be hidden due to system settings that are designed to protect critical system files. By using Folder Options, the technician can enable the option to show hidden files and protected operating system files, which might reveal the .dll file that is not appearing in the System32 directory.
Why the other options are incorrect:
A. System: The System utility in Control Panel is used to access system settings like the computer name, hardware configuration, and system protection options. It doesn’t deal with file visibility or accessing hidden files.

B. Display: The Display utility is used to configure screen resolution, appearance, and related settings. It does not affect file visibility.

D. Indexing Options: Indexing Options is used to configure and manage the index of files that Windows searches. It does not affect the visibility or location of system files like .dll files.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%.
After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.
Which of the following is a tool the technician can use to resolve the issue?

A. Task Manager
B. MSTSC
C. MSConfig
D. PerfMon

A

A. Task Manager

The Task Manager is an advanced tool in Windows that provides a number of tabs that allow a user to monitor the applications, processes, services, and CPU utilization on a computer. The Processes tab more than anything else, because it lets you quickly see how system resources are utilized, which can be very helpful when trying to troubleshoot applications or find out why the computer is suddenly performing slowly. The Task Manager can be used to identify and stop processes that use excessive system resources and to keep the computer operating at high speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions.
Which of the following should a technician recommend?

A. Uninterruptible power supply
B. Surge protector
C. Power strip
D. Power distribution unit

A

A. Uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following installation types would require the use of an answer file to install the OS?

A. Unattended
B. Clean
C. Repair
D. Upgrade

A

A. Unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?

A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp

A

A. Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.
Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A. Create a policy to remove Internet access from the server during off hours
B. Set the local antivirus software on the server to update and scan daily
C. Ensure the server is patched with the latest security updates
D. Educate the manager on safe Internet browsing practices

A

C. Ensure the server is patched with the latest security updates

To prevent infection, it is important that all servers and workstations remain patched and up to date on their security updates. After that, the next best thing would be to set up the anti-virus to automatically update itself daily and run a full scan nightly. Beyond that, educating your supervisor would be a good idea, as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With which of the following types is a man-in-the-middle attack associated?

A. Brute force
B. Spoofing
C. DDoS
D. Zero-day

A

B. Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically.
Which of the following steps should the technician take NEXT to resolve the problem?

A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
D. Send a test email, open a command prompt to check the file system, and empty the browser cache

A

B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

*Why the other options are incorrect:
A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS: While running a repair on the OS might help in some situations, this approach seems too drastic for the problem at hand, and safe mode isn’t necessary unless the technician suspects a system-wide issue (such as a driver conflict or OS corruption). The problem appears more related to network connectivity and settings than to an OS-level issue.

C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode: TPM (Trusted Platform Module) and BIOS settings are unlikely to be the cause of the reported issues. System Restore might be an option, but it’s a bit too extreme for this type of problem, especially given that the issue seems more related to internet and email connectivity, which can be fixed through the software and configuration level.

D. Send a test email, open a command prompt to check the file system, and empty the browser cache: While sending a test email and emptying the browser cache could be helpful in diagnosing some of the issues, checking the file system (e.g., using commands like chkdsk) seems unnecessary in this scenario. The symptoms point more to network and software configuration problems, which makes Option B the most relevant choice.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.
Which of the following documents did the network administrator MOST likely give to the technician?

A. Process diagram
B. Physical network diagram
C. Fiber backbone diagram
D. Logical topology diagram

A

B. Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed.
Which of the following command-line tools should the technician use to apply the new policy?

A. gpupdate
B. diskpart
C. gpresult
D. net use

A

A. gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?

A. Full device encryption
B. Account lock
C. Multifactor authentication
D. Strong password requirements

A

C. Multifactor authentication

OBJ-2.8: If a user or system has configured their email accounts to require two-factor authentication (2FA) or multifactor authentication, then even if they enter their username and password correctly in the third-party email client they will receive the “Invalid credentials” error message. To overcome this, some email servers will allow the user to create an Application Specific Password to bypass the multifactor authentication requirement, or the user will have to use an email client that supports multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In which of the following file extension types would a user expect to see the command. net use T:\\server\files?

A. .bat
B. .vbs
C. .js
D. .py

A

A. .bat

.bat files are batch files, which are used to execute a series of commands in Windows Command Prompt (CMD). The command net use T:\server\files is a network command used to map a network drive (T:) to a shared folder on a server (\server\files). This type of command is commonly found in batch files (.bat), which can be executed in a Windows environment to automate processes such as network drive mappings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?

A. System memory
B. Surge protector
C. Hard drives
D. Battery backup

A

D. Battery backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

A. Put on an ESD strap.
B. Place components on an ESD mat
C. Disconnect the power before servicing the PC
D. Place the PC on a grounded work bench

A

C. Disconnect the power before servicing the PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized.
Which of the following messages will be displayed?

A. NTLDR not found
B. No boot device available
C. Operating system not found
D. BIOS ROM checksum error

A

B. No boot device available

If the hard drive is not recognized, the system cannot find a device to boot from. This would typically result in a message like B. No boot device available.
Option C, “Operating system not found”, might be displayed if the hard drive was recognized but the operating system could not be loaded, which is not the case here. The other options, “NTLDR not found” and “BIOS ROM checksum error”, are related to other types of errors.
Not Option C because the hard drive is not recognized. If the the hard drive was recognized and it still doesn’t boot, then the answer would be C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as ConnectMe and appears as unsecure.
Which of the following should the help desk perform to fix the issue?

A. Remote into Ann’s system and restart the wireless adapter
B. Ask Ann to open a browser and watch for a redirect page
C. Advice Ann to plug an Ethernet cable into her laptop
D. Direct Ann to run an antivirus program on her laptop

A

B. Ask Ann to open a browser and watch for a redirect page

Example of this is when you use Starbucks wifi. You are connected once you select the SSID but in order to access the internet you need to open a browser and agree to their internet guidelines.
B is correct.

32
Q

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.
Which of the following would MOST likely fix the issue?

A. Roll back updates
B. Disable the Windows Update service
C. Check for updates
D. Restore hidden updates

A

A. Roll back updates

33
Q

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement? (Choose two.)

A. WPA
B. WPA2
C. WEP
D. TKIP
E. RADIUS
F. Multifactor
G. TACACS
H. SSO

A

B. WPA2
F. Multifactor

34
Q

A technician is PXE booting a computer.
Which of the following is the technician MOST likely performing on the computer?

A. Image deployment
B. Multiboot configuration
C. In-place upgrade
D. System repair

A

A. Image deployment

PXE is Preboot Execution Environment which is used for OS installations (Image deployment) over a network

35
Q

Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)

A. Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
B. Verify Ann’s laptop has the correct browser settings
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
D. Attempt to log on to another vendor’s website from Ann’s laptop
E. Ask Ann about the notification and review the installed programs
F. Reinstall the browser, reboot the laptop, and check the vendor’s website again

A

B. Verify Ann’s laptop has the correct browser settings
E. Ask Ann about the notification and review the installed programs

36
Q

Which of the following is the maximum RAM limit of a Windows 32-bit version?

A. no limit
B. 4GB
C. 8GB
D. 32GB

A

B. 4GB

37
Q

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.
Which of the following steps should be taken FIRST to determine the cause of the issue?

A. Uninstall the camera application
B. Check the application permissions
C. Reset the phone to factory settings
D. Update all of the applications on the phone
E. Run any pending OS updates

A

B. Check the application permissions

38
Q

Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?

A. Single-factor
B. Multifactor
C. RADIUS
D. TACACS

A

A. Single-factor

39
Q

Which of the following devices provides protection against brownouts?

A. battery backup
B. surge suppressor
C. rack grounding
D. line conditioner

A

D. line conditioner

While a Battery Backup (UPS) can help during a brownout, a Line Conditioner is more specialized for this purpose

40
Q

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a ? in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance.
Which of the following is the MOST likely issue Ann is experiencing?

A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased

A

A. There is unauthenticated wireless connectivity

41
Q

A junior Linux systems administrator needs to update system software.
Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

A. sudo
B. chmod
C. grep
D. pwd

A

A. sudo

42
Q

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.
If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

A. Default SSID
B. MAC filtering
C. Power levels
D. Content filtering
E. Firewall

A

C. Power levels

43
Q

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.
Which of the following should the technician attempt NEXT?

A. Reboot into safe mode and roll back the updates
B. Repair the Windows Registry
C. Configure boot options in the BIOS
D. Disable Windows services and applications

A

A. Reboot into safe mode and roll back the updates

44
Q

A Windows user is attempting to install a local printer and is unsuccessful based on permissions.
Which of the following user types BEST describes this user?

A. Guest
B. Power User
C. Administrator
D. Standard User

A

A. Guest

45
Q

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the
Internet.
Which of the following actions should the user take?

A. Update antivirus definitions
B. Install anti-malware software
C. Enable the pop-up blocker
D. Reboot the PC

A

B. Install anti-malware software

46
Q

A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network.
Which of the following boot methods initiates such an upgrade?

A. SSD
B. Optical drive
C. Flash drive
D. PXE

A

D. PXE

47
Q

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis.
Which of the following is an important part of the change request process for which the administrator still must plan?

A. Inform management regarding the anticipated amount of downtime
B. Document a backout plan to roll back changes to the router
C. Configure a redundant data path to eliminate downtime
D. Make the downtime window larger than actually anticipated

A

B. Document a backout plan to roll back changes to the router

48
Q

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?

A. Delete the user accounts
B. Disable the user accounts
C. Restrict the user accounts
D. Reset the user accounts

A

B. Disable the user accounts

49
Q

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:
✑ Two 1GHz CPUs
✑ 2GB of memory
✑ 15GB hard drive
800 ֳ— 600 screen resolution

Which of the following should the technician do to resolve the problem?

A. Increase the number of CPUs
B. Increase the amount of memory
C. Increase the amount of hard drive space
D. Increase the screen resolution

A

C. Increase the amount of hard drive space

16 GB available hard disk space (32-bit) or 20 GB (64-bit)

50
Q

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?

A. Rootkit
B. Keylogger
C. Trojan
D. Ransomware

A

C. Trojan

OBJ-2.4: A trojan is a type of malware that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. The most common form of a trojan is a Remote Access Trojan (RAT), which is used to allow an attacker to remotely control a workstation or steal information from it. To operate, a trojan will create numerous processes that run in the background of the system.

51
Q

Which of the following is considered government-regulated data?

A. PHI
B. End-user license agreement
C. Digital Millennium Copyright Act
D. DRM

A

A. PHI

Four types of government regulated data according to my Pearson CompTIA A+ 1001 & 1002 textbook:
PII
PCI
GDPR
PHI

52
Q

A technician is installing the latest OS on a user’s system. The user wants all of the settings and files to remain intact during the installation.
Which of the following upgrade methods should the technician use?

A. network installation
B. clean install
C. in-place upgrade
D. image deployment

A

C. in-place upgrade

53
Q

A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?

A. Air filters
B. Privacy screens
C. Vacuums
D. ESD mats

A

A. Air filters

Air filters is the most correct answer for this scenario. Dust particles and other debris can obstruct fans and airways in server equipment leading to overheat and other damages.
Privacy screens are incorrect; this room will not be subject to the prying eyes of an office environment.
Vacuums is incorrect, though may be needed occasionally if people enter or exit the server room frequently.
ESD mats are incorrect as this room is not implied to be used as a computer maintenance room.

54
Q

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring.
Which of the following would BEST accomplish this goal?

A. Use an antivirus product capable of performing heuristic analysis
B. Use a host-based intrusion detection system on each computer
C. Disallow the password caching of accounts in the administrators group
D. Install a UTM in between PC endpoints to monitor for suspicious traffic
E. Log all failed login attempts to the PCs and report them to a central server

A

A. Use an antivirus product capable of performing heuristic analysis

Heuristic analysis refers to a method used by antivirus software to detect potential malware based on behavioral patterns or characteristics rather than relying solely on known virus signatures.
OBJ-2.2: The only solution provided that could STOP this from reoccurring would be to use an anti-virus or anti-malware solution with heuristic analysis. The other options might be able to monitor and detect the issue, but not stop it from spreading. Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should be able to detect the issue in the scenario provided and stop it from spreading throughout the network.

55
Q

Which of the following techniques is used by malicious employees to obtain user passwords?

A. Man-in-the-middle
B. Phishing
C. Tailgating
D. Shoulder surfing

A

D. Shoulder surfing

56
Q

A technician is recycling PCs to be reused by a middle school.
Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

A. Standard formatting
B. HD drilling
C. Low-level formatting
D. HD partitioning

A

C. Low-level formatting

Standard formatting - Data can still be recoverable
OBJ-2.9: Low-level formatting is a hard disk operation that should make recovering data from your storage devices impossible once the operation is complete. It sounds like something you might want to do if giving away a hard disk or perhaps discarding an old computer that may have contained useful and important private information. Standard formatting of the drives could allow for the data to be restored and could make the data vulnerable to exposure. Drilling or hammers the HDD platters would physically destroy the drives and the data, but it would make the laptops useful for the community center. Degaussing the drives would also render the drives useless to the community center. Therefore, the safest method is a low-level format since it fully destroys the data and allows the drives to be reused by the community center.

57
Q

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and
PST files are preserved.
Which of the following methods would the technician MOST likely perform on the computer?

A. Unattended installation
B. Refresh upgrade
C. Clean installation
D. In-place upgrade

A

D. In-place upgrade

OBJ-1.3: An in-place upgrade will preserve all of the user’s files and applications during the upgrade process from Windows 8 to Windows 10. A clean installation will completely format the hard drive (losing all of the files and applications) and then install a new copy of Windows 10. A reset upgrade will keep the user’s data files, but not the applications on the system. An unattended installation is used to perform a clean install and use the configurations from an answers file instead of an interactive session with the installer.

58
Q

Which of the following is the MOST secure wireless security protocol?

A. AES
B. WPA
C. WPA2
D. WEP

A

C. WPA2

59
Q

Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

A. Use full device encryption
B. Enable a pattern lock
C. Implement remote wipe features
D. Use device lockout policies
E. Require complex administrator passwords
F. Disable unknown application installations

A

A. Use full device encryption
C. Implement remote wipe features

60
Q

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.
Which of the following should the technician do NEXT?

A. Provide documentation of the repair to the customer
B. Allow the customer to voice concerns and post the story to social media later
C. Inform the customer the job is done and return to the office
D. Defend each step and why it was necessary

A

A. Provide documentation of the repair to the customer

61
Q

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?

A. Biometric device
B. Common access card
C. Cable lock
D. Privacy screen
E. Mantrap

A

D. Privacy screen

62
Q

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.
Which of the following best practices could have prevented the attack?

A. Implementing strong passwords
B. Changing default credentials
C. Disabling AutoRun
D. Removing Guest account
E. Encrypting data

A

C. Disabling AutoRun

63
Q

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

A. WPA2
B. AES
C. MAC filtering
D. RADIUS
E. WPS

A

D. RADIUS

RADIUS is commonly used to integrate with services like Active Directory or other identity management systems to enable SSO and provide secure authentication to WiFi and network resources.

64
Q

A technician has installed a second monitor for a customer, but the desktop font sizes do not match.
Which of the following display settings should the technician adjust to correct this issue?

A. Resolution
B. Refresh rate
C. Extended monitor
D. Color depth

A

A. Resolution

*When a technician installs a second monitor and notices that the desktop font sizes do not match, this issue is most likely due to a resolution mismatch between the two monitors. Each monitor might have a different native resolution, which can result in differences in how the text and icons are displayed on each screen.

Why the other options are less relevant:
B. Refresh rate: The refresh rate controls how many times per second the screen refreshes. This setting doesn’t directly affect font size, but rather the smoothness of motion and display quality. It’s unlikely to fix the font size mismatch.

C. Extended monitor: This option refers to the display mode where the desktop is extended across multiple monitors. While this is necessary for using multiple monitors, it doesn’t directly address the issue of font size mismatch.

D. Color depth: The color depth determines the number of colors that can be displayed on the screen. It doesn’t affect the size of the text or the appearance of fonts.*

65
Q

Which of the following built-in accounts was removed in Windows 10?

A. Power User
B. Administrator
C. Guest
D. Standard User

A

A. Power User

66
Q

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No
Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting.
Which of the following steps should the technician take NEXT?

A. Reboot into safe mode
B. Check the boot order
C. Format the drive
D. Perform Windows Recovery
E. Run the chkdsk command

A

B. Check the boot order

67
Q

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter J assigned only to the drive.
Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

A. GPT
B. Dynamic
C. Basic
D. Extended

A

A. GPT

MBR = 2TB with 4 prim partitions
GPT= Greater than 2TB with 128 partitions

68
Q

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade.
Which of the following plans must be implemented to revert back to the most recent version of the firmware?

A. Backout plan
B. Contingency plan
C. Alternative plan
D. Backup plan

A

A. Backout plan

The rollback plan, also called the backout plan, describes the steps to roll back from a failed

69
Q

Which of the following BEST describes the purpose of an ESD mat?

A. Protects against accidental static discharge
B. Protects against dust/dirt contamination
C. Protects against accidental scratches
D. Protects against accidental water damage

A

A. Protects against accidental static discharge

70
Q

Which of the following is a reason to use WEP over WPA?

A. Device compatibility
B. Increased security
C. TACACS
D. Multifactor authentication

A

A. Device compatibility

Device compatibility is the primary reason someone might still use WEP over WPA in certain situations. Older devices or hardware that do not support WPA or newer encryption standards might still require the use of WEP. This is particularly common with legacy devices or very old wireless network hardware.

71
Q

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

A. BranchCache
B. Swap partition
C. Domain access
D. Proxy server

A

A. BranchCache

BranchCache caches content like files or web pages, reducing the need to repeatedly access data over the WAN and improving performance, especially in remote or branch office scenarios.

72
Q

A technician accessed a network share from a computer joined to workgroup. The technician logged in as user1 and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the user1 account.
Which of the following would allow the technician to log in using the administrator username?

A. Use the command: net use Z: \fileserver\share
B. Go to the Sync Center and disable the offline files feature.
C. Delete the ג€userג€ account for the network share in Credential Manager.
D. Join the computer and file server to a domain and delegate administrator rights to ג€user1ג€.
E. Use the Advanced Sharing options in the Network and Sharing Center and enable ג€turn on network discoveryג€.

A

A. Use the command: net use Z: \fileserver\share

The net use command is used to manage network connections and mapped drives in Windows. By specifying the net use command explicitly, the technician can force Windows to prompt for a new set of credentials, rather than automatically using the saved credentials (in this case, user1).

73
Q

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.
Which of the following is the most likely NEXT step?

A. Disable System Restore.
B. Create a restore point.
C. Apply system updates.
D. Restart into safe mode.

A

D. Restart into safe mode.

74
Q

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

A. Local Administrator
B. Standard User
C. Power User
D. Guest User

A

D. Guest User

75
Q

A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory.
Which of the following should the technician use to accomplish this?

A. Devices and Printers
B. Sync Center
C. Device Manager
D. Power Options

A

C. Device Manager

If you go to Device Manager, open “Print Ques” and right click on your printer. You will be able to click “disable device” on the printer you want to disable

76
Q

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error.
Which of the following tools should the technician use?

A. Performance Monitor
B. Component Services
C. Task Manager
D. Event Viewer

A

D. Event Viewer

When investigating an application crash, Event Viewer is the most appropriate tool to use. It records detailed information about system events, including application crashes, hardware failures, and other system-related issues. By using Event Viewer, the technician can access the Application Logs to look for specific error messages related to the crashed application, such as error codes, event IDs, and stack traces that can help pinpoint the cause of the issue.