A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?
A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. Which of the following steps should the technician take to improve the computer's performance?
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)
An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Select two.)
Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?
Chain of custody is important because if evidence has been altered or it cannot be proven that it was not altered during the time between collection and use in court, then that evidence is less believable or credible than it otherwise would be.
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?
A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?
A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?
A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?
A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot Which of the following should the technician complete to resolve the issue?
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
Which of the following Windows Enterprise OS version Offers BitLocker as a feature that can be enabled?
Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?
A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).
A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?
Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.
Which of the following is causing the error?
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?
A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet.
Which of the following should the technician check FIRST?
After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly Which of the following should the technician do NEXT?
A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)
A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?
Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.
Which of the following would be the BEST resolution to Ann’s issue?
What a user is allowed to do on a computer network would be addressed in:
A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?
A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?
A user spills a small amount of toner from a laser printer onto the floor. Which of the following is the safest way to clean up the toner?
A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or
replacement. The PC has numerous errors during the boot process and is running a very outdated operating
system. Which of the following should the technician do?
While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?
An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?
When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a
When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?
A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play Which of the following is MOST likely causing the Issue?
Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?
The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.
Which of the following would be the MOST secure solution to this error?
A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?
Which of the following would BEST support an 8TB hard drive with one partition?
A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?
A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:
Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?
A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)
A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?
A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?
A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step?
A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?
Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?
A company needs to destroy several SSDs that contain sensitive information. Which of the following methods
is BEST suited for the total destruction of the SSDs?
Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?
A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a
hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for
subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent
any further emails from this organization?
An administrator changed the lite permissions on a Linux server from -rwxrw-r-x to -rwxrwxrwx. Which of the following commands did the administrator use?
A new policy requires all users to log on to their corporate workstations using smart card authentication. Which of the following best practices should be implemented to further secure access to workstations?
A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found Which of the following is the MOST likely cause of the issue?
A user's laptop screen goes Clank every time the keyboard and/or mouse are not active for five minutes The user needs to change the settings for this option. Which of the following Control Panel utilities allows the user to make the adjustment?
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?
An employee is taking a credit card payment over the phone, but the payment system has a temporary outage. To avoid inconveniencing the customer, the employee writes down the credit card number and expiration date on a notepad to be entered later This is in violation of:
A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer’s issue?
The Chief Information Security Officer (CISO) wants to ensure the company is prepared in case of a ransomware attack. The CISO has requested network vulnerability scans, firewall audits, and ACL logs. Which of the following should the CISO also request?
Which of the following should a technician do FIRST before opening a computer case to replace a part?
A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?
A user cannot print to a network printer. A technician runs the Windows 10 troubleshooting utility, but it does not find any errors. Which of the following printer settings should the technician check NEXT?
A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue. According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?
A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?
A user’s mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?
A technician deployed a new file server on the network. The technician wants to map the file server as a network drive on all users' computers when they log onto the network by creating a logon script Which of the following should the technician use?
Which of the following account types account types enables and end user to install software without restrictions?
A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?
Which of the following is a Device that stores a copy of a certificate that is used for authentication?
A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task''
A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications. Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?
An administrator needs to uninstall an update on a Windows 7 computer. Which of the following Control Panel utilities would make this possible?
Which of the following operating systems has versions for servers, workstations, and phones?
A technician is setting up a laptop for a company. The company is very concerned about data loss after one of a laptops was stolen. Which of the following security best practices should be implemented to address this concern?
A technician is developing a backup and disaster recovery plan for a customer. The customer requires quick file recovery when necessary, but wants to ensure recovery is possible in case of a complete disaster, with data loss of no more than three days. Which of the following backup procedures should the technician suggest to BEST meet the customer's needs?
A customer has called the help desk because a word processing application will no longer open. It was working fine earlier, but the user had to close a document quickly. An error message popped up about a network resource, and then the document crashed. Now, when the user clicks on the icon to launch the application, it does not give an error and will not open. Which of the following should a technician do FIRST?
A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously, Which of the following
changes should the technician recommend FIRST to address the customer's concern?
A smartphone user has been receiving unsolicited emails that contain Pl in the webmail inbox associated with the device. Which of the following steps should the user take FIRST to identify the cause of the issue?
A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD. The technician logs the following process information:
Based on this data, which of the following is the MOST likely cause of the performance issues?
A user contains the help desk the restore an application that was lost when a System Restore was performed last week. A technician development the application was emitted to the user from an unknown source and downloaded from a link in the email. Which of the following should the technician do NEXT?
A technician configures a switch for an enterprise to use 802.1X. Which of the following logical security concepts uses 802.1X?
An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?
A user can no longer edit files on the company shared drive. The user previously used has access to these files. A technician verifies the user can view the folders but cannot open any subfolders or folders. Which of the following must happen to fix this issue?
A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow. Which of the following should the technician do NEXT? !•: A. Identify the issue and its impact to the business.
B. Report the incident to the proper teams or management for awareness.
C. Start a root cause analysts and create documentation
D. Create an action plan and implement the solution
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.
Which of the following would the project team MOST likely add to the SOW?
A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?
A Windows user is attempting to install a local printer and is unsuccessful on permissions.
Which of the following user types BEST describes this user?
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:
Two 1GHz CPUs
2GB of memory
15GB hard drive
800x600 screen resolution
Which of the following should the technician do to resolve the problem?
A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?