Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?
A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?
The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.
Which of the following would be the MOST secure solution to this error?
Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?
Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?
Which of the following installation methods allows a technician to install Windows from a remote location
A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)
Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)
A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?
(Choose two.)
A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks. Which of the following best practices would a technician MOST likely implement as pari of the security template? (Select TWO).
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.
You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D
Please repair this failure without overwriting the customers’ local user profiles.
INSTRUCTIONS
Use the Windows recovery and repair utilities to remediate the issue.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a
hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for
subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent
any further emails from this organization?
A user recently connected a Windows laptop to a free WiFi hot-spot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause?
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Select two.)
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?
A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?
Which of the following threats uses personalized information in an attempt at obtaining information?
A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user’s request? (Select TWO)
A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)
A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?
A user's personal settings are not saving, and a technician suspects the user's local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but It does not appear in the user's profile directory. Which of the following Control Panel utilities should the technician use to correct this?
Which of the following provide the BEST security for a server room? (Select two.)
Which of the following types of scripts would be seen on the user end of a web page?
A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.
Which of the following should the network administrator do NEXT?
A company has hired a new IT firm to manage its network switches and routers.
The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?
A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?
A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?
The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?
An executive has contacted you through the help-desk chat support about an issue with a mobile device.
Assist the executive to help resolve the issue.
INSTRUCTIONS
Select the MOST appropriate statement for each response.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Let’s take a look at your phone settings.
Please change the port number on your mail settings to 993.
Which of the following should be done NEXT?
A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?
An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?
A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?
When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a
A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?
During a network server outage, the administrators computer received an IP address of 169.254.0.10 and had no access to internal or external resources. Which of the following should be configured to ensure the administrator's computer retains network access?
Which of the following must be enabled to configure 20 new machines to be booted over a network?
A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step?
A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?
Which of the following would MOST likely be connected to a computer to provide electricity in case of a blackout?
A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?
Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.
Which of the following is the FIRST step the technician should take to correct this issue?
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.
Which of the following should the technician do?
A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:
Which of the following is the MOST likely cause of the problem?
A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page The technician tries with a third-party browser and connects without error The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed'?
A technician must manually modify the HOSTS system file in order to resolve a website address to a specified
local destination. Which of the following utilities should the technician use to BEST accomplish the task?
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.
The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:
Which of the following should be changed to resolve this issue?
A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task?
A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).
A company is implementing multifactor authentication and requires a solution that utilizes TCP. Which of the following will the company MOST likely select?
A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?
A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection Which of the following will the technician MOST likely use to connect to the server?
A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early Which of the following is the NEXT step the technician should perform?
A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following shouW a technician perform NEXT to remediate the system?
A customer recently upgraded from Windows 7 to Windows 10. The customer lost access to certain network shares, and the system keeps preventing the user's access. Which of the following is the MOST likely cause of the issue?
Many of the files in a user's network folder have a new file extension and are inaccessible. After some
troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a
large sum of money is required to decrypt them.
Which of the following should the technician do to recover the files?
Which of the following physical security measures is intended to mitigate tailgating?
A technician is creating a network topology diagram Which of the following would be the MOST appropriate to include? (Select TWO)
A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously, Which of the following
changes should the technician recommend FIRST to address the customer's concern?
Which of the following Windows technologies can render a Me unreadable by anyone other than the file's creator?
A technician needs to recommend a disaster recovery solution for a company that has three offices across two
states. The technician must ensure the solution has:
• The ability to centralize data backups
• High availability
• The ability to synchronize user data to local machines
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
A customer is planning to recycle a computer. The customer wants to ensure any personal data on the computer is no longer recoverable, but the hardware must will still the be useable. Which of the following is the BEST method to dispose of the customer’s data?
A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines?
A technician is removing malware from a workstation. The malware was installed via a phishing attack, which
was initiated from a link that was included in an email.
Which of the following should the technician do to address this issue? (Choose two.)
A user's laptop screen goes black after five minutes of not being used. Which of the following Windows Control Panel utilities should be used to modify the user experience?
A technician recently upgrade a leptop a replo’s RAM from 2GB to 4hb. However , the operating system only recognizes the RAM as 3.5GB. Which of the following is the MOST likely reason the leptop does not recognize the full amount of RAM?
A sales manager uses a phone as a hot-spot to connect a laptop to the Internet. The connection is fast most of the time, but the connection becomes noticeably slower every few weeks. The manager contacts the help desk for assistance. Which of the following should a technician check NEXT to troubleshoot the issue?
A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?
A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?
A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389. The technician will have to change the listening port for the new access. Which of the following OS tools should the technician use on the PC to change the listening port for RDP?
Joe, a user, reports the programs and icons on his Windows desktop are much larger than they were the day before. He tried changing the screen resolution and restarting the computer, but it still does not look right. Joe also states the computer showed it was finishing updates when he first powered it on. Which of the following should a technician perform NEXT?
A user often loses connectivity while in the back offices of a building. Given the following access point control settings:
Which of the following settings needs to be configured to resolve the issue?
A company would like to increase its security measures because a workstation was recently hacked. Which of the following would offer the BEST protection from unauthorized access of workstations?
A user on a local desktop wants to allow a blocked program through the Windows Firewall. Which of the following user accounts is necessary to perform this task?
Which of the following would MOST likely be connected to a computer Id provide electricity in case of a blackout?
A user's computer was infected with malware, and a technician successfully removed the infection However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue?
Which of the following is the maximum amount of RAM a computer can access if it is using a 32-bit version of the Windows OS?
A user’s login screen does not look normal when booting the computer. A technician states the computer was showing the company’s workstation imaging system screen, but it has since been fixed. Which of the following did the technician update?
Which of the following physical security measures can be combined with a badge reader to create an MFA system to control physical access?
Which of the following allows for per-command authentication and authorization?
A systems administrator created a policy that should create a shortcut on a user's desktop Shortly after the policy was created, a technician inspects the user's desktop and notices the shortcut is not present. The administrator verifies that the policy was created correctly and that it is being applied to the user's account. Which of the following will MOST Likely resolve the issue Immediately without interrupting the user's session?
Which of the following is a risk to computer equipment when the humidity is low?