Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CORE PRACTICE EXAM LATEST 2024 QUESTIONS WITH CORRECT ANSWERS GRADED A+, Exams of Information Technology

CORE PRACTICE EXAM LATEST 2024 QUESTIONS WITH CORRECT ANSWERS GRADED A+ SIMULATION -A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.Make sure to maintain a consistent file system. - CORRECT ANSWER - -> Right click on disk 1, click on initialize -> Choose disk and option as MBR. Hit ok. -> Again, right click on disk 1 and choose convert to dynamic disk. -> Now right click on disk 1 and choose new simple volume. -> Specify storage as 256000 and assign a drive letter F and choose file system as

Typology: Exams

2023/2024

Available from 09/04/2024

NurseTakshif
NurseTakshif 🇬🇧

833 documents

1 / 24

Toggle sidebar

Related documents


Partial preview of the text

Download CORE PRACTICE EXAM LATEST 2024 QUESTIONS WITH CORRECT ANSWERS GRADED A+ and more Exams Information Technology in PDF only on Docsity! CORE PRACTICE EXAM LATEST 2024 QUESTIONS WITH CORRECT ANSWERS GRADED A+ SIMULATION -A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.Make sure to maintain a consistent file system. - CORRECT ANSWER - -> Right click on disk 1, click on initialize -> Choose disk and option as MBR. Hit ok. -> Again, right click on disk 1 and choose convert to dynamic disk. -> Now right click on disk 1 and choose new simple volume. -> Specify storage as 256000 and assign a drive letter F and choose file system as NTFS and click finish. -> Do the same thing for rest of space of disk 1, assigning 512000MB and using Disc G A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? A. Reinstall the application B. Roll back the application to the earlier version C. Clear the application cache D. Update the OS of the smartphones - CORRECT ANSWER - D. Update the OS of the smartphones A technician is working on a Windows 10 PC that is running slowly.Which of the following commands should the technician use to correct this issue? (Choose two.) A. dir B. chkdsk C. dism D. ipconfig E. format F. diskpart - CORRECT ANSWER - B. chkdsk C. dism An administrator is setting up a Windows terminal server.Which of the following settings should the administrator modify to increase server security? (Choose two.) A. Change the default access port B. Enforce password complexity C. Put the terminal server into the router's DMZ D. Disable logon time restrictions E. Block all unused ports on the LAN smart switch F. Use the local client certificate for server authentication - CORRECT ANSWER - C. Put the terminal server into the router's DMZ E. Block all unused ports on the LAN smart switch A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices.Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC - CORRECT ANSWER - B. SSH A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP - CORRECT ANSWER - C. Default login F. WEP A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID - CORRECT ANSWER - C. Asset ID, MAC address Which of the following provide the BEST security for a server room? (Choose two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades - CORRECT ANSWER - A. Badge reader C. Biometric lock Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing - CORRECT ANSWER - D. Spear phishing A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? D. Windows 10 - CORRECT ANSWER - A. Windows 7 Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved - CORRECT ANSWER - C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA - CORRECT ANSWER - A. SSO A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User - CORRECT ANSWER - A. Guest A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license types should the technician recommend? A. Open license B. Personal license C. Corporate license D. Enterprise license - CORRECT ANSWER - A. Open license Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed? A. Frequently restore the servers from backup files and test them B. Configure the backups to restore to virtual machines for quick recovery C. Set up scripts that automatically rerun failed backup jobs D. Set up alerts to let administrators know when backups fail E. Store copies of the backups off-side in a secure datacenter - CORRECT ANSWER - D. Set up alerts to let administrators know when backups fail A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.) A. Backup testing B. Cloud storage C. Local storage backups D. Data recovery E. Hot site F. Waterproof devices - CORRECT ANSWER - B. Cloud storage E. Hot site A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually - CORRECT ANSWER - B. Look up the error number associated with the failed update A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use? A. System B. Display C. Folder Options D. Indexing Options - CORRECT ANSWER - C. Folder Options A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the user about how to avoid malware in the future C. Update the antivirus software and run a full system scan D. Move the infected system to a lab with no network connectivity - CORRECT ANSWER - D. Move the infected system to a lab with no network connectivity A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%.After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue? A. Task Manager B. MSTSC C. MSConfig D. PerfMon - CORRECT ANSWER - A. Task Manager A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit - CORRECT ANSWER - A. Uninterruptible power supply Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade - CORRECT ANSWER - A. Unattended A Mac user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used? A. Time Machine B. Snapshot C. System Restore D. Boot Camp - CORRECT ANSWER - A. Time Machine A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices - CORRECT ANSWER - C. Ensure the server is patched with the latest security updates A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles - CORRECT ANSWER - B. Restart the network services A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access D. Strong password requirements - CORRECT ANSWER - C. Multifactor authentication In which of the following file extension types would a user expect to see the command. "net use T:\\server\files"? A. .bat B. .vbs C. .js D. .py - CORRECT ANSWER - A. .bat A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard drives D. Battery backup - CORRECT ANSWER - D. Battery backup Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC? A. Put on an ESD strap. B. Place components on an ESD mat C. Disconnect the power before servicing the PC D. Place the PC on a grounded work bench - CORRECT ANSWER - C. Disconnect the power before servicing the PC Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error - CORRECT ANSWER - B. No boot device available Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapter B. Ask Ann to open a browser and watch for a redirect page C. Advice Ann to plug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on her laptop - CORRECT ANSWER - B. Ask Ann to open a browser and watch for a redirect page A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals - CORRECT ANSWER - C. Backout plan A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates - CORRECT ANSWER - A. Roll back updates An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Choose two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility - CORRECT ANSWER - A. Remove applications from startup B. Defragment the hard drive A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Choose two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO - CORRECT ANSWER - B. WPA2 F. Multifactor A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D. System repair - CORRECT ANSWER - A. Image deployment Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.) A. Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop B. Verify Ann’s laptop has the correct browser settings C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website D. Attempt to log on to another vendor’s website from Ann’s laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the brow - CORRECT ANSWER - C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website E. Ask Ann about the notification and review the installed programs Which of the following is the maximum RAM limit of a Windows 32-bit version? A. no limit B. 4GB C. 8GB D. 32GB - CORRECT ANSWER - B. 4GB A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue? A. Uninstall the camera application B. Check the application permissions C. Reset the phone to factory settings D. Update all of the applications on the phone E. Run any pending OS updates - CORRECT ANSWER - B. Check the application permissions Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS - CORRECT ANSWER - A. Single-factor Which of the following devices provides protection against brownouts? A. battery backup B. surge suppressor C. rack grounding D. line conditioner - CORRECT ANSWER - A. battery backup C. Restrict the user accounts D. Reset the user accounts - CORRECT ANSWER - B. Disable the user accounts A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:-> Two 1GHz CPUs-> 2GB of memory-> 15GB hard drive800 × 600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution - CORRECT ANSWER - C. Increase the amount of hard drive space A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption - CORRECT ANSWER - A. Reduce the transmit power E. Disable the SSID broadcast A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have? A. Rootkit B. Keylogger C. Trojan D. Ransomware - CORRECT ANSWER - A. Rootkit Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process? A. Driver detection B. Metro interface C. Account control D. PXE installation - CORRECT ANSWER - A. Driver detection Which of the following is considered government-regulated data? A. PHI B. End-user license agreement C. Digital Millennium Copyright Act D. DRM - CORRECT ANSWER - A. PHI A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.) A. Default SSID B. MAC filtering C. NAT D. QoS E. Signal strength F. Encryption - CORRECT ANSWER - B. MAC filtering E. Signal strength A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewall - CORRECT ANSWER - A. Disable guest account C. Modify AutoRun settings A technician is installing the latest OS on a users system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use? A. network installation B. clean install C. in-place upgrade D. image deployment - CORRECT ANSWER - C. in-place upgrade A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room? A. Air filters B. Privacy screens C. Vacuums D. ESD mats - CORRECT ANSWER - A. Air filters A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal? A. Use an antivirus product capable of performing heuristic analysis B. Use a host-based intrusion detection system on each computer C. Disallow the password caching of accounts in the administrators group D. Install a UTM in between PC endpoints to monitor for suspicious traffic E. Log all failed login attempts to the PCs and report them to a central server - CORRECT ANSWER - A. Use an antivirus product capable of performing heuristic analysis Which of the following technologies is used by malicious employees to obtain user passwords? A. Main-in-the-middle B. Phishing C. Tailgating D. Shoulder surfing - CORRECT ANSWER - D. Shoulder surfing A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning - CORRECT ANSWER - C. Low-level formatting A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Choose two.) A. Reset the users browser to default settings B. Delete the users cached images, temporary files, and cookies C. Reboot the users computer and install a secondary antivirus D. Convince the user to use a different web browser that is currently unaffected E. Download the update to the users web browser of choice F. Remove any unapproved applications from the users startup items - CORRECT ANSWER - A. Reset the users browser to default settings F. Remove any unapproved applications from the users startup items A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer? A. Unattended installation B. Refresh upgrade C. Clean installation D. In-place upgrade - CORRECT ANSWER - B. Refresh upgrade Which of the following is the MOST secure wireless security protocol? A. AES B. WPA C. WPA2 D. WEP - CORRECT ANSWER - A. AES Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and B. Refresh rate C. Extended monitor D. Color depth - CORRECT ANSWER - A. Resolution Which of the following built-in accounts was removed in Windows 10? A. Power User B. Administrator C. Guest D. Standard User - CORRECT ANSWER - A. Power User A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT? A. Reboot into safe mode B. Check the boot order C. Format the drive D. Perform Windows Recovery E. Run the chkdsk command - CORRECT ANSWER - B. Check the boot order Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joes slow data speeds? A. Joes data transmission is over the limit B. The phone needs to be rebooted from overuse C. The use of GPS interferes with data speeds D. There is unintended Bluetooth pairing - CORRECT ANSWER - A. Joes data transmission is over the limit After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.) A. Screen locks B. Screensaver passwords C. UEFI passwords D. Login time restrictions E. Strong passwords F. Multifactor authentication G. BitLocker H. Credential Manager I. Smart card J. Biometric authentication - CORRECT ANSWER - A. Screen locks B. Screensaver passwords G. BitLocker A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need? A. PHI certification B. PCI compliance C. POTS implementation D. PII filtering - CORRECT ANSWER - B. PCI compliance A technician has been dispatched to resolve a malware problem on a users workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT? A. Run the scan again to ensure all malware has been removed B. Quarantine the infected workstation from the network C. Install all of the latest Windows Updates to patch the system D. Educate the user on safe browsing practices - CORRECT ANSWER - C. Install all of the latest Windows Updates to patch the system A users smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT? A. Reset the devices network settings B. Check the data usage statistics on the device C. Verify the SSID with which the device is associated D. Run any pending application or OS updates - CORRECT ANSWER - C. Verify the SSID with which the device is associated A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the users workstation? A. chkdsk B. netstat C. gpupdate D. diskpart - CORRECT ANSWER - C. gpupdate A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control - CORRECT ANSWER - A. Date and time Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue? A. See if Joes email address has been blacklisted B. Change the password on Joes email account C. Update the antivirus and perform a full scan on the PC D. Isolate Joes computer from the network - CORRECT ANSWER - D. Isolate Joes computer from the network A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used? A. Degauss B. Drive wipe C. Standard format D. Low-level format - CORRECT ANSWER - B. Drive wipe A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter J assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive? A. GPT B. Dynamic C. Basic D. Extended - CORRECT ANSWER - A. GPT A users corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue? A. The Internet security options have changed B. The operating system updates have changed C. The network directory permissions have changed D. The user account permissions have changed - CORRECT ANSWER - C. The network directory permissions have changed During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware? A. Backout plan B. Contingency plan C. Alternative plan D. Backup plan - CORRECT ANSWER - A. Backout plan Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed? A. Unattended installation B. Remote installation C. Repair installation D. Image deployment installation - CORRECT ANSWER - D. Image deployment installation