Exam4Training

CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training

Question #1

Which of the following is a reason to use WEP over WPA?

  • A . Device compatibility
  • B . Increased security
  • C . TACACS
  • D . Multifactor authentication

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

WEP (Wired Equivalent Privacy) was introduced when the 802.11 standard for Wi-Fi networks was launched. It allows the use of a 64-bit or 128-bit key. However, researchers discovered vulnerabilities in WEP in 2001 and proved that it was possible to break into any WEP network by using a brute-force method to decipher the key. Using WEP is not recommended.

WPA, which stands for Wi-Fi Protected Access, is a newer standard and is much more secure.

Question #2

Which of the following types of scripts would be seen on the user end of a web page?

  • A . .bat
  • B . .js
  • C . .sh
  • D . .vbs

Reveal Solution Hide Solution

Correct Answer: D
Question #3

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

  • A . Reboot into safe mode and roll back the updates
  • B . Repair the Windows Registry
  • C . Configure boot options in the BIOS
  • D . Disable Windows services and applications

Reveal Solution Hide Solution

Correct Answer: A
Question #4

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.

With which of the following types of infections are the PCs MOST likely infected? (Select two.)

  • A . Spyware
  • B . Zombies
  • C . Virus
  • D . Ransomware
  • E . Worm
  • F . Botnet

Reveal Solution Hide Solution

Correct Answer: B,E
Question #5

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error.

Which of the following should the technician do NEXT? (Choose two.)

  • A . Remove any proxy servers configured on the user’s browsers.
  • B . Assist the user with purchasing an SSL certificate and save the certificate to the desktop.
  • C . Disable the SPI firewall on the office’s gateway and any other routers.
  • D . Instruct the user to ignore the certificate error since the user is connecting to a secure website.
  • E . Create an outbound rule in Windows Firewall named after the user’s homepage.
  • F . Run anti-malware scans and download the latest Windows updates.

Reveal Solution Hide Solution

Correct Answer: A,F
Question #6

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

  • A . The computer has GRUB Legacy installed
  • B . Windows Startup services are not running
  • C . An incompatible partition is marked as active
  • D . An unsupported version of Windows is installed

Reveal Solution Hide Solution

Correct Answer: C
Question #7

A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user reports that, after updating the workstation’s graphics driver to a beta version, the machine gives a "Stop" error on every boot.

Which of the following should the technician complete to resolve the issue?

  • A . Boot the workstation in safe mode and disable the graphics driver system tray menu
  • B . Boot the workstation in safe mode with networking and install the latest stable graphics driver.
  • C . Boot the workstation in safe mode and disable Windows driver signing requirements
  • D . Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

Reveal Solution Hide Solution

Correct Answer: A
Question #8

A technician is repairing a computer.

Which of the following should the technician do to protect the computer from accidental voltage spikes?

  • A . Practice electrical fire safety.
  • B . Clean tools properly before use.
  • C . Remove any jewelry.
  • D . Connect a proper ESD strap.

Reveal Solution Hide Solution

Correct Answer: D
Question #9

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory,.

Which of the following should the technician use to accomplish this?

  • A . Devices and Printer
  • B . Sync Center
  • C . Device Manager
  • D . Power Option

Reveal Solution Hide Solution

Correct Answer: C
Question #10

Which of the following devices provides protection against brownouts?

  • A . battery backup
  • B . surge suppressor
  • C . rack grounding
  • D . line conditioner

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which of the following is a community supported, open source OS used for both services and workstations?

  • A . IOS
  • B . Windows 10
  • C . Linux
  • D . OS X

Reveal Solution Hide Solution

Correct Answer: C
Question #12

An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols.

Which of the following will the administrator MOST likely use to log in to these servers?

  • A . SSL
  • B . RDP
  • C . SSH
  • D . Telnet

Reveal Solution Hide Solution

Correct Answer: D
Question #13

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.

Which of the following license type should the technician recommend?

  • A . Open license
  • B . Personal license
  • C . Corporate license
  • D . Enterprise license

Reveal Solution Hide Solution

Correct Answer: A
Question #14

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

  • A . Universal serial bus locks
  • B . Personal identity verification cards
  • C . Privacy screen
  • D . Entry control roster
  • E . Door locks
  • F . Privacy window

Reveal Solution Hide Solution

Correct Answer: E,F
Question #15

Which of the following BEST describes the purpose of an ESD mat?

  • A . Protects against accidental static discharge
  • B . Protects against dust/dirt contamination
  • C . Protects against accidental scratches
  • D . Protects against accidental water damage

Reveal Solution Hide Solution

Correct Answer: A
Question #16

In which of the following file extension types would a user expect to see the command. “net use T: serverfiles’?

  • A . .bat
  • B . .vbs
  • C . .js
  • D . .py

Reveal Solution Hide Solution

Correct Answer: A
Question #17

A junior Linux system administrator needs to update system software.

Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

  • A . sudo
  • B . chmod
  • C . grep
  • D . pwd

Reveal Solution Hide Solution

Correct Answer: A
Question #18

Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users’ names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.

Which of the following should the technician check NEXT?

  • A . Hijacked email
  • B . DNS entries
  • C . Hosts file
  • D . POP3 errors

Reveal Solution Hide Solution

Correct Answer: A
Question #19

A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

  • A . dir
  • B . chdsk
  • C . dism
  • D . ipconfig
  • E . format
  • F . diskpart

Reveal Solution Hide Solution

Correct Answer: B,C
Question #20

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.

Which of the following steps should be taken FIRST to determine the cause of the issue?

  • A . Uninstall the camera application
  • B . Check the application permissions
  • C . Reset the phone to factory settings
  • D . Update all of the applications on the phone
  • E . Run any pending OS updates

Reveal Solution Hide Solution

Correct Answer: B

Question #21

A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources.

Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

  • A . Data execution prevention
  • B . Page-file size
  • C . Visual effects
  • D . Processor scheduling

Reveal Solution Hide Solution

Correct Answer: B
Question #22

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized.

Which of the following messages will be displayed?

  • A . NTLDR not found
  • B . No boot device available
  • C . Operating system not found
  • D . BIOS ROM checksum error

Reveal Solution Hide Solution

Correct Answer: B
Question #23

A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

  • A . Air filters
  • B . Privacy screens
  • C . Vacuums
  • D . ESD mats

Reveal Solution Hide Solution

Correct Answer: A
Question #24

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.

Which of the following Control Panel utilities should the technician use?

  • A . System
  • B . Display
  • C . Folder Options
  • D . Indexing Options

Reveal Solution Hide Solution

Correct Answer: C
Question #25

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective.

A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

  • A . Privacy C Maps
  • B . Display C Brightness
  • C . Storage C Photos
  • D . Mail C Work

Reveal Solution Hide Solution

Correct Answer: B
Question #26

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

  • A . Access control lists
  • B . Multifactor authentication
  • C . Organizational unit
  • D . Trusted software sources
  • E . Data loss prevention
  • F . Pre-shared key

Reveal Solution Hide Solution

Correct Answer: B,D
Question #27

A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable.

Which of the following is the BEST method of securing the phone?

  • A . Fingerprint lock
  • B . Passcode lock
  • C . Swipe lock
  • D . PIN lock

Reveal Solution Hide Solution

Correct Answer: A
Question #28

A technician logs on to a Linux computer and runs the following command:

ps -aux | grep vi

Which of the following MOST accurately describes the effect of the command?

  • A . It kills any running programs starting with the letters vi.
  • B . It opens a list of directories that start with the letters vi.
  • C . It creates a new file named grep in the current working directory.
  • D . If finds a list of processes running a text editor.

Reveal Solution Hide Solution

Correct Answer: D
Question #29

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed.

Which of the following would be the appropriate action for Joe?

  • A . Contact his supervisor so the supervisor can make schedule changes.
  • B . Move the appoints to the next business day.
  • C . Reach out to a colleague to assist in completing the jobs.
  • D . Continue to work on the current call, and get to the others as soon as possible.

Reveal Solution Hide Solution

Correct Answer: A
Question #30

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up. counting down the time until the computer is no longer usable.

Which of the following should the technician do NEXT?

  • A . Research the pop-up to see if it is a legitimate malware solution.
  • B . Click on the pop-up window to resolve the issue before the time runs out.
  • C . Send an email to all staff members warning them of malware on their system.
  • D . Disconnect the Ethernet cable from the workstation and disable WiFi.

Reveal Solution Hide Solution

Correct Answer: D

Question #31

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.

Which of the following should the technician do NEXT?

  • A . Provide documentation of the repair to the customer
  • B . Allow the customer to voice concerns and post the story to social media later
  • C . Inform the customer the job is done and return to the office
  • D . Defend each step and why it was necessary

Reveal Solution Hide Solution

Correct Answer: A
Question #32

An employee reported that a suspicious individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

  • A . Phishing
  • B . Spear phishing
  • C . Dumpster diving
  • D . Impersonation

Reveal Solution Hide Solution

Correct Answer: C
Question #33

Which of the following is considered government-regulated data?

  • A . PII
  • B . End-user license agreement
  • C . Digital Millennium Copyright Act
  • D . DRM

Reveal Solution Hide Solution

Correct Answer: A
Question #34

A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.

Which of the following is MOST likely causing the missing folders issue?

  • A . The Internet security options have changed
  • B . The operating system updates have changed
  • C . The network directory permissions have changed
  • D . The user account permissions have changed

Reveal Solution Hide Solution

Correct Answer: C
Question #35

Which of the following is the MOST secure wireless security protocol?

  • A . AES
  • B . WPA
  • C . WPA2
  • D . WEP

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

  • A . Local Administrator
  • B . Standard User
  • C . Power User
  • D . Guest User

Reveal Solution Hide Solution

Correct Answer: D
Question #37

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

  • A . Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot
  • B . Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one
  • C . Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
  • D . Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

Reveal Solution Hide Solution

Correct Answer: C
Question #38

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low.

Which of the following tasks should be done FIRST?

  • A . Disconnect the network cable.
  • B . Update the antivirus software.
  • C . Run an antivirus scan.
  • D . Shut down the PC

Reveal Solution Hide Solution

Correct Answer: A
Question #39

Which of the following threats uses personalized information in an attempt at obtaining information?

  • A . Whaling
  • B . Impersonation
  • C . Spoofing
  • D . Spear phishing

Reveal Solution Hide Solution

Correct Answer: D
Question #40

A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem.

Which of the following should the technician do NEXT?

  • A . Reboot the computer
  • B . Restart the network services
  • C . Roll back the device drivers
  • D . Rebuild the Windows profiles

Reveal Solution Hide Solution

Correct Answer: B

Question #41

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.

Which of the following needs to be adjusted on the workstation to fix the issue?

  • A . Date and time
  • B . UEFI boot mode
  • C . Logon times
  • D . User access control

Reveal Solution Hide Solution

Correct Answer: A
Question #42

A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications.

Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?

  • A . Network and Sharing Center
  • B . Sync Center
  • C . User Account Control
  • D . Credential manager

Reveal Solution Hide Solution

Correct Answer: D
Question #43

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.

If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

  • A . Default SSID
  • B . MAC filtering
  • C . Power levels
  • D . Content filtering
  • E . Firewall

Reveal Solution Hide Solution

Correct Answer: C
Question #44

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.

Which of the following troubleshooting steps should the technician take NEXT?

  • A . Reset the device’s network settings
  • B . Check the data usage statistics on the device
  • C . Verify the SSID with which the device is associated
  • D . Run any pending application or OS updates

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Verify the SSID with which the device is associated C Most likely, the user’s smartphone is connecting to a neighbor’s wireless network instead of their own. This network likely has a lower signal strength since it is outside the home, and this is causing the limited or slow bandwidth. Therefore, you should first verify that the user is connected to the proper wireless network before conducting any additional troubleshooting.

Question #45

A technician has set up a new computer for a customer and needs to add a login with administrative privileges.

Which of the following tools should the technician use?

  • A . Component Services
  • B . System Configuration
  • C . Security Policy
  • D . Local Users and Groups

Reveal Solution Hide Solution

Correct Answer: D
Question #46

A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user’s computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard.

Which of the following would be BEST suited for this task?

  • A . VNC
  • B . Telnet
  • C . SSH
  • D . RDP

Reveal Solution Hide Solution

Correct Answer: C
Question #47

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

  • A . Guest network
  • B . TKIP
  • C . Default login
  • D . Outdated firmware
  • E . WPS
  • F . WEP

Reveal Solution Hide Solution

Correct Answer: C,F
Question #48

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs.

Which of the following would be the MOST effective method to accomplish this task?

  • A . Drill
  • B . Hammer
  • C . Low-level format
  • D . Degaussing

Reveal Solution Hide Solution

Correct Answer: D
Question #49

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network.

Which of the following boot methods initiates such an upgrade?

  • A . SSD
  • B . Optical drive
  • C . Flash drive
  • D . PXE

Reveal Solution Hide Solution

Correct Answer: D
Question #50

An end user’s PC is taking a long time to boot.

Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

  • A . Remove applications from startup
  • B . Defragment the hard drive
  • C . Install additional RAM
  • D . Install a faster hard drive
  • E . End the processes in Task Manager
  • F . Run the Disk Cleanup utility

Reveal Solution Hide Solution

Correct Answer: A,B

Question #51

A user’s computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses.

Which of the following is MOST likely the problem?

  • A . Rootkit
  • B . Zero-day malware
  • C . Rogue antivirus
  • D . Old virus definitions

Reveal Solution Hide Solution

Correct Answer: D
Question #52

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP.

Which of the following would be the NEXT appropriate act?

  • A . Promptly notify the administrator’s immediate supervisor
  • B . Rename the folder on the server, and notify the information security officer
  • C . Move the folder to another location on the server, and notify the local authorities
  • D . Ask the owner to move the files from the server to a local computer

Reveal Solution Hide Solution

Correct Answer: A
Question #53

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade.

Which of the following plans must be implemented to revert back to the most recent version of the firmware?

  • A . Backout plan
  • B . Contingency plan
  • C . Alternative plan
  • D . Backup plan

Reveal Solution Hide Solution

Correct Answer: D
Question #54

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.

Which of the following actions should the user take FIRST?

  • A . Check to ensure the printer selected is the default printer
  • B . Check the status of the print server queue
  • C . Cancel all documents and print them again
  • D . Check that the printer is not offline print mode

Reveal Solution Hide Solution

Correct Answer: B
Question #55

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.

Which of the following protocols and authentication methods should the technician implement? (Select two.)

  • A . WPA
  • B . WPA2
  • C . WEP
  • D . TKIP
  • E . RADIUS
  • F . Multifactor
  • G . TACACS
  • H . SSO

Reveal Solution Hide Solution

Correct Answer: B,F
Question #56

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.

Which of the following documents did the network administrator MOST likely give to the technician?

  • A . Process diagram
  • B . Physical network diagram
  • C . Fiber backbone diagram
  • D . Logical topology diagram

Reveal Solution Hide Solution

Correct Answer: B
Question #57

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.

Which of the following can Joe do to ensure the backups will work if needed?

  • A . Frequently restore the servers from backup files and test them
  • B . Configure the backups to restore to virtual machines for quick recovery
  • C . Set up scripts that automatically rerun failed backup jobs
  • D . Set up alerts to let administrators know when backups fail
  • E . Store copies of the backups off-side in a secure datacenter

Reveal Solution Hide Solution

Correct Answer: D
Question #58

A technician is disposing of computer hardware that contains PHI. The drive must be reusable.

Which of the following methods should be used?

  • A . Degauss
  • B . Drive wipe
  • C . Standard format
  • D . Low-level format

Reveal Solution Hide Solution

Correct Answer: B
Question #59

A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

  • A . Delete the user’s AD account.
  • B . Decrease the user’s AD privileges.
  • C . Disable the user’s AD account.
  • D . Reset the password on the user’s AD account.

Reveal Solution Hide Solution

Correct Answer: C
Question #60

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal.

Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

  • A . Pad and chmod
  • B . Node and vi
  • C . Is an chown
  • D . Ps and kill
  • E . Op and rm

Reveal Solution Hide Solution

Correct Answer: D

Question #61

A technician has identified malware on a user’s system.

Which of the following should the technician do NEXT according to malware removal best practices?

  • A . Enable System Restore and create a restore point so no data is lost
  • B . Educate the user about how to avoid malware in the future
  • C . Update the antivirus software and run a full system scan
  • D . Move the infected system to a lab with no network connectivity

Reveal Solution Hide Solution

Correct Answer: D
Question #62

Which of the following provide the BEST security for a server room? (Select two.)

  • A . Badge reader
  • B . Bollard
  • C . Biometric lock
  • D . Cable lock
  • E . USB token
  • F . Privacy window shades

Reveal Solution Hide Solution

Correct Answer: A,C
Question #63

A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.

Which of the following is the BEST method to implement to prevent any data loss for the sales representative?

  • A . Give the sales representative a USB security lock.
  • B . Encrypt the laptop’s image on the server.
  • C . Create a redundant cloud storage drive.
  • D . Give the sales representative an external hard drive.

Reveal Solution Hide Solution

Correct Answer: C
Question #64

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

  • A . End-user education
  • B . Pre-installation environment cleaning
  • C . Disabling of System Restore
  • D . Infected system quarantine

Reveal Solution Hide Solution

Correct Answer: A
Question #65

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.

Which of the following best practices could have prevented the attack?

  • A . Implementing strong passwords
  • B . Changing default credentials
  • C . Disabling AutoRun
  • D . Removing Guest account
  • E . Encrypting data

Reveal Solution Hide Solution

Correct Answer: C
Question #66

A Windows user is attempting to install a local printer and is unsuccessful on permissions.

Which of the following user types BEST describes this user?

  • A . Guest
  • B . Power User
  • C . Administrator
  • D . Standard User

Reveal Solution Hide Solution

Correct Answer: A
Question #67

With which of the following types is a man-in-the-middle attack associated?

  • A . Brute force
  • B . Spoofing
  • C . DDoS
  • D . Zero-day

Reveal Solution Hide Solution

Correct Answer: B
Question #68

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet.

Which of the following actions should the user take?

  • A . Update antivirus definitions
  • B . Install anti-malware software
  • C . Enable the pop-up blocker
  • D . Reboot the PC

Reveal Solution Hide Solution

Correct Answer: B
Question #69

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

  • A . BranchCache
  • B . Swap partition
  • C . Domain access
  • D . Proxy server

Reveal Solution Hide Solution

Correct Answer: A
Question #70

A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.

Which of the following actions should the IT department perform NEXT?

  • A . Preserve data integrity
  • B . Identify violations of acceptable use
  • C . Collect evidence of illegal activity
  • D . Report through proper channels

Reveal Solution Hide Solution

Correct Answer: A

Question #71

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)

  • A . Disable guest account
  • B . Remove admin permissions
  • C . Modify AutoRun settings
  • D . Change default credentials
  • E . Run OS security updates
  • F . Install a software firewall

Reveal Solution Hide Solution

Correct Answer: A,C
Question #72

Which of the following built-in accounts was removed in Windows 10?

  • A . Power User
  • B . Administrator
  • C . Guest
  • D . Standard User

Reveal Solution Hide Solution

Correct Answer: A
Question #73

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

  • A . Unattended installation
  • B . Remote installation
  • C . Repair installation
  • D . Image deployment installation

Reveal Solution Hide Solution

Correct Answer: D
Question #74

Which of the following is the memory limitation of a 32-bit OS?

  • A . 16MB
  • B . 2048MB
  • C . 4GB
  • D . 1024GB
  • E . 2TB
  • F . 8TB

Reveal Solution Hide Solution

Correct Answer: C
Question #75

A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user.

Which of the following commands should the administrator run on the user’s workstation?

  • A . chkdsk
  • B . netstat
  • C . gpupdate
  • D . diskpart

Reveal Solution Hide Solution

Correct Answer: C
Question #76

A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely.

Which of the following steps should a technician perform?

  • A . Establish a remote connection, install free third-party malware software, scan the machine for malware, and restart the machine.
  • B . Explain the steps to access safe mode with networking, establish a remote connection, run approved malware tools, and restart the machine.
  • C . Establish a remote connection, install a free third-party backup tool, back up the user’s software, and instruct the user on how to reinstall Windows.
  • D . Explain the steps to access safe mode with networking, set a restore point, run company-approved malware tools, and restart the machine.

Reveal Solution Hide Solution

Correct Answer: D
Question #77

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.

Which of the following recommendations should the contractor give to the customer? (Select two.)

  • A . Backup testing
  • B . Cloud storage
  • C . Local storage backups
  • D . Data recovery
  • E . Hot site
  • F . Waterproof devices

Reveal Solution Hide Solution

Correct Answer: B,E
Question #78

Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

  • A . Folder Redirection
  • B . Group Policy
  • C . Security Groups
  • D . Home Folder

Reveal Solution Hide Solution

Correct Answer: C
Question #79

Which of the following NTFS security settings overrides all other settings?

  • A . Deny
  • B . Modify
  • C . Read
  • D . Write

Reveal Solution Hide Solution

Correct Answer: D
Question #80

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors.

Which of the following Is MOST likely the Issue?

  • A . PSU alarm
  • B . Humidity alarm
  • C . Temperature alarm
  • D . Motion alarm

Reveal Solution Hide Solution

Correct Answer: C

Question #81

A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.

Which of the following security concepts has the company just enabled?

  • A . Certificates
  • B . Least privilege
  • C . Directory permissions
  • D . Blacklists

Reveal Solution Hide Solution

Correct Answer: B
Question #82

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.

Which of the following methods would the technician MOST likely perform on the computer?

  • A . Unattended installation
  • B . Refresh upgrade
  • C . Clean installation
    D In-place upgrade

Reveal Solution Hide Solution

Correct Answer: B
Question #83

A new business will be using credit cards in a physical location as well as its web presence.

Which of the following does the business need?

  • A . PHI certification
  • B . PCI compliance
  • C . POTS implementation
  • D . PII filtering

Reveal Solution Hide Solution

Correct Answer: B
Question #84

A technician is installing a private PC in a public workspace.

Which of the following password practices should the technician implement on the PC to secure network access?

  • A . Remove the guest account from the administrators group
  • B . Disable single sign-on
  • C . Issue a default strong password for all users
  • D . Require authentication on wake-up

Reveal Solution Hide Solution

Correct Answer: D
Question #85

A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

  • A . Telnet
  • B . SSH
  • C . RDP
  • D . VNC

Reveal Solution Hide Solution

Correct Answer: B
Question #86

A technician responds to a call from a user who claims to have a virus on a workstation.

The technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware.

Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

  • A . Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.
  • B . Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications.
  • C . Back up the user’s files. Restore the system to the original system image designated by corporate IT policies. Restore the user’s files.
  • D . Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

Reveal Solution Hide Solution

Correct Answer: A
Question #87

A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.

Which of the following is causing the error?

  • A . Small hard drive
  • B . Insufficient RAM
  • C . OS compatibility
  • D . Folder permissions

Reveal Solution Hide Solution

Correct Answer: C
Question #88

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow.

Which of the following is the MOST likely cause of this issue?

  • A . Files disappearing
  • B . File permission changes
  • C . Application crash
  • D . Too many start items

Reveal Solution Hide Solution

Correct Answer: A
Question #89

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping.

The remote connection drops periodically.

Which of the following steps should the technician take NEXT to resolve the problem?

  • A . Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
  • B . Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
  • C . Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
  • D . Send a test email, open a command prompt to check the file system, and empty the browser cache

Reveal Solution Hide Solution

Correct Answer: B
Question #90

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

  • A . Guest
  • B . Administrator
  • C . Power User
  • D . Remote Desktop User

Reveal Solution Hide Solution

Correct Answer: A

Question #91

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.

Which of the following built-in utilities should be used?

  • A . Time Machine
  • B . Snapshot
  • C . System Restore
  • D . Boot Camp

Reveal Solution Hide Solution

Correct Answer: A
Question #92

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.

Which of the following Control Panel utilities can Joe use to help with this situation?

  • A . Credential Manager
  • B . Network and Sharing Center
  • C . Security and Maintenance
  • D . Troubleshooting

Reveal Solution Hide Solution

Correct Answer: A
Question #93

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

  • A . WPA2
  • B . AES
  • C . MAC filtering
  • D . RADIUS
  • E . WPS

Reveal Solution Hide Solution

Correct Answer: D
Question #94

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns.

Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

  • A . Default SSID
  • B . MAC filtering
  • C . NAT
  • D . QoS
  • E . Signal strength
  • F . Encryption

Reveal Solution Hide Solution

Correct Answer: B,E
Question #95

A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up notifications.

Which of the following are the MOST likely causes of these issues? (Choose two.)

  • A . System files have been deleted
  • B . Proxy settings are configured improperly
  • C . The OS has been updated recently
  • D . There are disabled services on the vendor website
  • E . Program file permissions have changed recently
  • F . There is a rogue anti-malware program

Reveal Solution Hide Solution

Correct Answer: B,F
Question #96

A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.

Which of the following should the technician do to remove the threat from the system?

  • A . Remove all parameters after the FQDN website address.
  • B . Remove all files from the temporary folder and restart the computer.
  • C . Remove and reinstall the web browser in safe mode.
  • D . Remove all lines that are not comments from the hosts file.

Reveal Solution Hide Solution

Correct Answer: B
Question #97

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

  • A . Domain name, location, IP address
  • B . Domain name, location, asset ID
  • C . Asset ID, MAC address
  • D . Location, RFID

Reveal Solution Hide Solution

Correct Answer: C
Question #98

Which of the following technologies is used by malicious employees to obtain user passwords?

  • A . Main-in-the-middle
  • B . Phishing
  • C . Tailgating
  • D . Shoulder surfing

Reveal Solution Hide Solution

Correct Answer: D
Question #99

A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus.

Which of the following steps should the technician take NEXT?

  • A . Disable the restore points.
  • B . Remediate the affected system.
  • C . Educate the user.
  • D . Quarantine the affected system.

Reveal Solution Hide Solution

Correct Answer: D
Question #100

Which of the following is the maximum RAM limit of a Windows 32-bit version?

  • A . no limit
  • B . 4GB
  • C . 8GB
  • D . 32GB

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version