Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A+ Certification Study Test Exams 2024/2025 Questions - 1102 Set with 100% Correct Verified Answers Graded A A+ Certification Study Test Exams 2024/2025 Questions - 1102 Set with 100% Correct Verified Answers Graded A A+ Certification Study Test Exams 2024/2025 Questions - 1102 Set with 100% Correct Verified Answers Graded A A+ Certification Study Test Exams 2024/2025 Questions - 1102 Set with 100% Correct Verified Answers Graded A A+ Certification Study Test Exams 2024/2025 Questions - 1102 Set with 100% Correct Verified Answers Graded A A+ Certification Study Test Exams 2024/2025 Questions - 1102 Set with 100% Correct Verified Answers Graded A
Typology: Exams
1 / 34
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage? Connected a proper ESD strap A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? Default gateway A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns? Differential A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again? Rollback plan A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue? Uninstall the fraudulent application A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?
Remote wipe When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? Provide the user with a unique ticket number that can be referenced on subsequent calls. Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop? Pro Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications? Install and run Linux and the required application as a virtual machine installed under the Windows OS A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform? Add the site to the client's exceptions list A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use? .app Which of the following is the MOST important environmental concern inside a data center? Humidity levels A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?
Standard account A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process? End user acceptance A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue? Processes A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO) Deploy an ad-blocking extension to the browser & Perform a reset on the user's web browser The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO) Enable multifactor authentication for each support account & Enforce account lockouts after five bad password attempts A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task? Disk Utility A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?
Enable BitLocker To Go with a password that meets corporate requirements A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose? Encrypting File System Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence? Chain of custody A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions? Avoid distractions An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager? Network utilization will be significantly increased due to the size of CAD files A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference? Changing channels A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue? OS reinstallation A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting? Check for any installed patches and roll them back one at a time until the issue is resolved
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft? Disk encryption A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST? Full A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do? Ask the user to click in the Search field, type Check for Updates, and then press the Enter key Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident? Vishing A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution? Remote wipe A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure? WPA2withAES A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements? PIN A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).
Utilizing an ESD strap & Disconnecting the computer from the power source A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO). Require a PIN on the unlock screen & Block a third-party application installation A company wants to remove information from past users' hard drives in order to reuse the hard drives Which of the following is the MOST secure method? Using disk-wiping software A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use? DHCP reservation A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi- Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi? The smartphone's line was not provisioned with a data plan A technician is investigating an employee's smartphone that has the following symptoms:
A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station? Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade? RAM Which of the following Wi-Fi protocols is the MOST secure? WPA A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer? Ransomware A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat? Manually check each machine. A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame? Cryptominer
Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string? Hash verification Which of the following OS types provides a lightweight option for workstations that need an easy- touse browser-based interface? Chrome OS Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader? Default Apps Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO). Biometric lock & Badge reader During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should: set AirDrop so that transfers are only accepted from known contacts A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take? Investigate what the interface is and what triggered it to pop up The command cac cor.pti a. txt was issued on a Linux terminal. Which of the following results should be expected? The contents of the text comptia. txt would be displayed.
A user's smarlphone data usage is well above average. The user suspects an installed application is transmitting data in the background The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern? Firewall A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason? The laptop has Windows 10 Home installed A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading? Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup. A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop? Clean install A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement? AUP A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST? Quarantine the system
A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user? Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete. A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use? dfrgui exe A user reports a computer is running stow. Which of the following tools will help a technician identify the issue? Resource Monitor A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue? Time drift Which of the following could be used to implement secure physical access to a data center? Badge reader A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option? Ease of Access A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue? Encrypting the hard drive
A technician needs lo formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use? exFAT A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal? Configure the network as private A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used? afc An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence? Clone any impacted hard drives After clicking on a link in an email a Chief Financial Officer (CFO) received the following error: The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST? Update the browser's CRLs A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT? Escalate the ticket A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used? Indexing Options
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat? Account lockout As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings? Use Settings to access Screensaver settings A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST? Default passwords An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user? VNC A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT? Rebuild the user's profile An executive has contacted you through the help-desk chat support about an issue with a mobile device. Assist the executive to help resolve the issue. Which of the following should be done NEXT? Educate the user on the solution that was performed Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company's wireless network. All the corporate laptops are connecting without issue. She has
asked you to assist with getting the device online. INSTRUCTIONS Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. See the Explanation below HOTSPOT Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue. Click on individual tickers to see the ticket details. View attachments to determine the problem. Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu. Look at images: H A user reports a computer is running slow. Which of the following tools will help a technician identity the issued? Resource Monitor An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT? Check if the battery is sufficiently charged A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool? Open Settings Select System, select Display, and change the Scale and layout setting to a higher percentage.
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST? Change the default administrative password. Which of the following Linux commands would be used to install an application? sudo A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes? Run chkdsk on the drive as the administrator. A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool? Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item? BitLocker is not included on Windows 10 Home. A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred? Failed OS updates Which of the following is a proprietary Cisco AAA protocol? TACACS+
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement? VPN A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred? Zero day A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use? exFAT A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook? Chrome OS An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST? Clear the application cache. A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe? Chain of custody A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT? Instruct the user to disconnect the Ethernet connection to the corporate network.
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task? Shredding A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment? Multifactor authentication will be forced for Wi-Fi A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need? Bollards A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue? Change the network channel. A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM? The newly installed OS is x86. Which of the following is a data security standard for protecting credit cards? PCI Which of the following should be used to control security settings on an Android phone in a domain environment? MDM
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO). ipconfig /all & hostname A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file? File Explorer A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default? .sh Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.? taskschd.msc A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation? Installer_x86.exe A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue. Which of the following should a technician do to remediate the issue? Rebuild the profile. Which of the following is an example of MFA? Smart card and password Which of the following command-line tools will delete a directory?
rd A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away? Use a key combination to lock the computer when leaving. A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center? Lock the workstations after five minutes of inactivity. A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively? SSH A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue? Remove the static IP configuration from the desktop. A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement? Incremental A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company's web server to become unavailable to the general public. Which of the following attacks is occurring?
Distributed denial of service While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue? The time or date was not in sync with the website. Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario? Owners can be notified a change is being made and can monitor it for performance impact. Most Voted Which of the following should be done NEXT? Educate the user on the solution that was performed. A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO) File Explorer & Windows Defender A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user? Educate the user on common threats and how to avoid them. Which of the following is the MOST basic version of Windows that includes BitLocker? pro A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
The GPS application contains malware. A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task? Full backup A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue? Enable the microphone under Windows Privacy settings to allow desktop applications to access it. A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario? Hard drive encryption A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue? The log-in script failed. A user received the following error upon visiting a banking website: The security presented by website was issued a different website' s address. A technician should instruct the user to: clear the browser cache and contact the bank. A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? Reinstalling the browser Which of the following is a consequence of end-of-lite operating systems? Operating systems no longer receive updates. Which of the following data is MOST likely to be regulated?
Name on a medical diagnosis Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE) .Pkg & .dmg & .app A help desk technician runs the following script: Inventory.py. The technician receives the following error message: How do you want to Open this file? Which of the following is the MOST likely reason this script is unable to run? The runtime environment is not installed. A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST likely in use? EULA A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network? The PXE boot option has not been enabled A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal? Internet Options An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements? A full backup of the data that is stored of site in cold storage
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor? Swapping the cables for the monitors A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the: acceptable use policy. A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department? Implementing a support portal An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly? Dumpster for recycling plastics A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT? Download the latest virus definitions A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do? Require the user to change the password at the next log-in. A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take?
Disconnect the machine from the network An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation? Apple Remote Desktop The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users? Enabling BitLocker on all hard drives A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement? WPA3 A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue? The workstations and the authentication server have a system clock difference. A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient? In-place upgrade A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST? System File Checker to check for modified Windows files
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files? Reboot the system in safe mode and rescan. A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use? Ease of Access Center While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT? Send a quick message regarding the delay to the next customer. An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT? Perform a risk analysis. A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted? Implement a single sign-on with biometrics. A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user? Windows Enterprise Edition
A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? Save software to an external hard drive to install. A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login? Accounts Which of the following is MOST likely contained in an EULA? Restrictions of use A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change? Task Manager A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor? Ease of Access Center A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue? Verify that NFC is enabled. A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script? The deployment script is performing unknown actions.