New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Exam Practice Test

Demo: 99 questions
Total 665 questions

CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question 1

A user’s antivirus software is reporting several infections and prompting the user to pay full version to remove the threats. A technician notices the corporate approved antivirus software has not been upgraded in months. Which of the following should the technician do NEXT to remove the threat?

Options:

A.

Connect the hard drive to another computer and reinstall the operating system.

B.

Remove all lines that are not comment from the host file and set it to ready only.

C.

Pay for the upgrade to remove the threats and install an trusted antivirus.

D.

Permission inheritance

Question 2

An end user set up a gaming server on an extra Windows PC. The user wants the PC to restart automatically during the night using the shutdown -r -£ command

Which of the following is the BEST tool to accomplish this?

A Computer Management

2B Task Scheduler b

C. Task Manager

D. Control Panel

Options:

Question 3

Ann, an employee, recently reported to the company's IT technician that her smartphone is exhibiting strange behavior. When she opens the application store. an error appears that indicates there is no connection However, the phone still receives emails and can access the Internet from the browser. The phone was backed up recently and auto-connects to a VPN. Which of the following troubleshooting steps should the technician take NEXT? (Select TWO).

Options:

A.

Reset the network settings

B.

Uninstall the application store.

C.

Restore from a backup.

D.

Clear the application cache and data

E.

Check the time and date settings.

F.

Reset application preferences.

Question 4

A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?

Options:

A.

Uninstall and reinstall the browser.

B.

Confirm the proper proxy settings

C.

Disable the firewall

D.

Disable and re-enable the network adapter.

Question 5

Which of the following account types account types enables and end user to install software without restrictions?

Options:

A.

Administrator

B.

Power user

C.

Standard

D.

Guest

Question 6

A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost Which of the following should be considered?

Options:

A.

Unintended W1F1 connection

B.

Unauthorized location tracking

C.

Data transmission over set limit

D.

Unintended Bluetooth pairing

Question 7

A user recently browsed several online shopping sites on a computer. Since then, the user has been experiencing pop-ups that appear in the browser. The pop-ups also display in the right

corner of the screen without the browser open. Which of the following should the technician do to remove the pop-ups?

Options:

A.

Enable a firewall.

B.

Apply OS security updates.

C.

Boot the computer in safe mode and run chkdsk.

D.

Run an anti-malware application

Question 8

Which of the following should be done prior to installing replacement RAM modules into a desktop computer?

Options:

A.

Wear an ESD wrist strap.

B.

Put on latex gloves

C.

Connect power to a grounded outlet

D.

Disconnect the CMOS battery

Question 9

A user can access the company's internal website properly, but some e-commerce websites have stopped loading and been replaced with an error message. The technician who is troubleshooting the issue tries to update the malware scanner over the network, but the automatic update fails. However, a manual update is successful from a USB drive. No viruses are detected on the device after a full system scan. Which of the following is the MOST likely cause of the issue?

Options:

A.

Incorrect time

B.

Browser redirection

C.

Hijacked email

D.

Rogue antivirus

Question 10

Which of the following would MOST likely be used in secure client-server communication?

Options:

A.

Redirection

B.

Certificates

C.

Port security

D.

Group Policy

Question 11

A user calls the help desk to report an issue accessing a new application on a Windows PC When the user tries to launch the application, an error message appears and then quietly disappears before the user can read it, Which of the following protocols would a technician MOST likely use to help diagnose this issue?

Options:

A.

FTP

B.

ROP

C.

SNWP

D.

SSH

Question 12

A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines?

Options:

A.

A USB key

B.

A firmware update

C.

A local disk

D.

Two-factor authentication

Question 13

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Question 14

Many of the files in a user's network folder have a new file extension and are inaccessible. After some

troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a

large sum of money is required to decrypt them.

Which of the following should the technician do to recover the files?

Options:

A.

Restore the network folder from a backup.

B.

Perform a System Restore on the computer.

C.

Update the malware scanner and run a full scan.

D.

Disconnect the computer from the network.

Question 15

To which of the following should a technician ground an ESD strap when adding memory to a workstation?

Options:

A.

Computer chassis

B.

Surge protector

C.

Wooden workbench

D.

Power supply

Question 16

A technician is able to connect to a website: however, the technician receives the following error, when alternating to access a different website: Page cannot be displayed. Which of the following command line tools would be BEST to identify the root cause of the connection problem?

Options:

A.

ipconfig

B.

tracert

C.

nslookup

D.

netstat

E.

ping

Question 17

A technician is cleaning malware on a Windows workstation. Which of the following would MOST likely prevent a recurrence of the same malware?

Options:

A.

Enable Shadow Copy.

B.

Disable System Restore.

C.

Update root certificates

D.

Modify file permissions

Question 18

A user needs to transfer some information from a work computer to a server. The user plugs a personal USB into the computer but is denied access to save information on the storage medium due to the security policy. This is an example of:

Options:

A.

port security.

B.

an access control list

C.

a Trojan horse,

D.

data loss prevention

Question 19

Ann a customer, allowed someone else to use her computer, and now some web pages do not display correctly in the browser A technician determines many of the browser settings live been changed Which of the following Control Panel utilities should the technician use to reset the browser settings to the defaults?

Options:

A.

System/System Protection

B.

Programs and Features

C.

Network and Sharing Center

D.

Internet Options/Advanced tab

Question 20

A technician is setting up a laptop for a company. The company is very concerned about data loss after one of a laptops was stolen. Which of the following security best practices should be implemented to address this concern?

Options:

A.

Enable full disk encryption.

B.

Configure a failed-attempts lockout.

C.

Disable AutoRun.

D.

Configure a BIOS password.

Question 21

A customer has called the help desk because a word processing application will no longer open. It was working fine earlier, but the user had to close a document quickly. An error message popped up about a network resource, and then the document crashed. Now, when the user clicks on the icon to launch the application, it does not give an error and will not open. Which of the following should a technician do FIRST?

Options:

A.

Run full antivirus and anti-malware scans on the computer.

B.

Check the processes to see if the task is still running and kill it.

C.

Reinstall the proprietary office suite of applications.

D.

Connect the computer to the network and remap the share.

Question 22

An end user's laptop Is not as fast as when it was first purchased. The user wants it to revert to that point without losing any data. A technician examines the laptop and notices it has a magnetic hard drive. Which of the following can the technician do to make the laptop faster?

Options:

A.

Roll back the updates

B.

Update the drivers.

C.

Defragment the system.

D.

Reinstall Windows

Question 23

A customer has been using a computer to download and copy files to a USB flash drive. The customer accidentally stepped on the power strip, and the computer suddenly powered off. When the computer turned back on, it displayed an error message: No OS found. Which of the following should a technician perform NEXT?

Options:

A.

Connect a UPS.

B.

Repair the OS.

C.

Check the boot order.

D.

Run hardware diagnostics.

Question 24

A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software Which of the following would be MOST important during this phase of the request process?

Options:

A.

Back-out plan

B.

End-user acceptance

C.

Risk analysis

D.

Test plan

Question 25

A user's computer has been performing sluggishly The user reports the computer lakes a long time to be ready to use after powering it on A technician decides to use MSConfig to review the applications that might be causing the slowdown On which of the following should the technician focus'? (Select TWO).

Options:

A.

Startup

B.

Disk Defragmenter

C.

Windows Updates

D.

Services

E.

Disk Cleanup

F.

Event Viewer

Question 26

A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?

Options:

A.

MSConfig

B.

Registry

C.

Hosts file

D.

boot.ini

Question 27

A healthcare institute has asked the IT department to help protect medical and financial data. Which of the following regulations is the healthcare provider MOST concerned about? (Choose two.)

Options:

A.

EULA

B.

DRM

C.

PHI

D.

PCI

E.

GDPR

F.

PII

Question 28

An IT manager receives a call from a user who states a technician completed work on a department laptop within the last week. The user indicates the technician tried to explain the issue

with the laptop, but the user was unable to understand because the technician used a lot acronyms. Additionally, the user claims the technician spoke too quickly when explaining the issue

and seemed preoccupied with a cell phone. The IT manager wants to address an email to the IT department to ensure the user's complaints are conveyed to the team. Which of the following

should the IT manager recommend in the email to the team? (Select TWO).

Options:

A.

Technicians should avoid using technical jargon when speaking to users.

B Technicians should avoid trying to explain complex issues to users.

B.

Technicians should avoid speaking to users who have complex issues.

C.

Technicians should avoid setting an expectation for project completion in front of the user.

D.

Technicians should avoid distractions when speaking with users.

E.

Technicians should avoid working in front of users.

Question 29

A technician is reinstalling Windows for a user and wants to keep the user's files and settings. Afterward, the user notices that personal files are no longer available and settings have been restored to default. Which of the following did the technician MOST likely execute to cause this issue?

A System reset

B. System update

C. System Restore

D. System refresh

Options:

Question 30

A user reports that an application has been closing unexpectedly for the past two days when posting

transactions. When an administrator attempts to access the application, it generates an error stating a data

library is missing.

Which of the following should a technician attempt FIRST?

Options:

A.

Uninstall and reinstall the application using the Windows Control Panel.

B.

Reinstall the application using the Windows Control Panel

C.

Repair the application using the Windows Control Panel.

D.

Locate the missing data library and copy it to the Windows program folder.

Question 31

A user suspects a computer Is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware. Which of the following steps should the technician take NEXT to address the infection?

Options:

A.

Educate the end user

B.

Schedule scans and run updates.

C.

Disable System Restore.

D.

Remediate the infected system.

Question 32

A user is unable to access certain files fram a specific folder. Which of the following commands should a technician use to modify the file permissions for a specific file?

Options:

A.

chown

B.

ls

C.

grep

D.

cp

Question 33

After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications?

Options:

A.

Account access

B.

Mobile data

C.

Location access

D.

Contacts access

Question 34

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

Options:

A.

Download and apply the security patch that addresses the vulnerability that was exploited

B.

Use System Restore to bring the PC back to a previous restore point.

C.

Reimage the computer and update it with all the latest patches

D.

Download another antivirus software that will quarantine the virus.

Question 35

An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?

Options:

A.

Increase the amount of RAM

B.

Reboot the server

C.

Check the system logs

D.

Perform disk defragmentation

Question 36

A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?

Options:

A.

Telnet

B.

HTTPS

C.

SSH

D.

RDP

E.

SFTP

Question 37

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

INSTRUCTIONS

Select the MOST appropriate statement for each response.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Let’s take a look at your phone settings.

Please change the port number on your mail settings to 993.

Which of the following should be done NEXT?

Options:

A.

Close the ticket out

B.

Educate the user on the solution that was performed

C.

Tell the user to take time to fix it themselves next time

D.

Send an email to Telecom to inform them of the issue and prevent reoccurrence

Question 38

Which of the following key and mouse combinations can be used to run an application as a different user?

Options:

A.

FN + Right-click

B.

Shift + Right-click

C.

Alt + Right-click

D.

Ctrl + Right-click

Question 39

Which of the following attack types exploits vulnerabilities in human nature?

Options:

A.

Zero-day

B.

Man-in-the-middle

C.

Spoofing

D.

Phishing

Question 40

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?

Options:

A.

Roll back updates.

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Question 41

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

Options:

A.

Risk analysis

B.

End-user acceptance

C.

Backout plan

D.

Plan for change

E.

Business processes

F.

Request for proposal

Question 42

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

Options:

A.

Plan for the change

B.

Scope of the change

C.

Risk analysis of the change

D.

Documentation of the change

Question 43

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

Options:

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Question 44

A user spills a small amount of toner from a laser printer onto the floor. Which of the following is the safest way to clean up the toner?

Options:

A.

Use a wet/dry vacuum.

B.

Use a broom and a dust pan

C.

Use damp paper towels.

D.

Spray the toner with canned air.

Question 45

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?

Options:

A.

Network-based

B.

Client/server

C.

Application streaming

D.

Peer-to-peer

Question 46

Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?

Options:

A.

Cable lock

B.

Windows key + L

C.

Smart card removal

D.

Key fob

E.

BIOS password

Question 47

A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?

Options:

A.

NTFS

B.

Ext4

C.

HFS

D.

FAT32

Question 48

A company wants to move the contents of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

Options:

A.

Organizational units

B.

Folder redirection

C.

Group Policy

D.

Login script

Question 49

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

Options:

A.

File attributes

B.

Share permissions

C.

Local share

D.

Inheritance

Question 50

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

Options:

A.

LCD monitor

B.

Power supply

C.

Laptop screen

D.

CRT monitor

E.

Motherboard

F.

Tablet

Question 51

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)

Options:

A.

Change management policy

B.

EULA

C.

BYOD policy

D.

Risk analysis

E.

MDM policy

F.

Time-based login policies

Question 52

A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?

Options:

A.

Ignore the message as a false positive

B.

Shut down and restart the computer.

C.

Unplug the Ethernet cable.

D.

Follow the onscreen instructions to remove the malware

Question 53

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?

(Choose two.)

Options:

A.

Slow performance

B.

Slow data speeds

C.

No wireless connectivity

D.

Baseband

E.

Application hang

F.

Overheating

Question 54

A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?

Options:

A.

Attributes

B.

Shares

C.

Inheritance

D.

Replication

Question 55

A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST?

Options:

A.

Contact the application vendor support staff for more information

B.

Boot into safe mode, and then load the ERD and restore the most recent files

C.

Boot the PC, run misconfig, check the safe boot box under the Boot tab, and then restart

D.

Log in as an administrative user and determine if the problem persists

Question 56

A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

Options:

A.

Change the default SSID

B.

Enable MAC filtering

C.

Update the firmware

D.

Set encryption

Question 57

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

Options:

A.

exFAT security

B.

Ext3 security

C.

HFS security

D.

EFS security

E.

CDFS security

Question 58

Which of the following Windows versions introduced using applications in the Metro interface?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Question 59

A corporate fileshare holds files for multiple departments. Individual users in each department create reports

that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that

encrypted all of the documents on the fileshare. The software asked for money to be transferred via

cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the

ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

Options:

A.

Enable System Restore on the file server and make frequent restore points.

B.

Disable full disk encryption on the file server.

C.

Install a next-generation firewall at the network edge.

D.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

E.

Use granular file permissions on the share and follow the principle of least privilege.

Question 60

A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Select TWO)

Options:

A.

Roll back the OS update

B.

Update the PRL.

C.

Force stop running applicabons

D.

Enable airplane mode

E.

Perform a factory reset

F.

Run application updates

G.

Reset network settings

Question 61

What a user is allowed to do on a computer network would be addressed in:

Options:

A.

a user acceptance policy

B.

regulatory and compliance policy

C.

a password policy

D.

an acceptable use policy

Question 62

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Options:

A.

Certificates

B.

Software tokens

C.

Firewall

D.

Port security

Question 63

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

Options:

A.

Loop

B.

Integer

C.

String

D.

Variable

Question 64

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?

Options:

A.

grep -d mandatory *

B.

grep -i mandatory *

C.

grep mandatory file

D.

grep mandatory *

Question 65

A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files. Which of the following settings should the user change to resolve the issue?

Options:

A.

Proxy settings

B.

Default gateway

C.

Firewall exceptions

D.

DNS

E.

QoS

Question 66

A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which

of the following should the technician monitor during the installation?

Options:

A.

Impact to the workstations

B.

Impact to the users

C.

Impact to the network

D.

Impact to the DHCP pool

Question 67

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

Options:

A.

Untrusted software

B.

Outdated antivirus

C.

MDM policies

D.

Inactive VPNs

Question 68

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.

Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

Options:

A.

Unattended installation

B.

Remote network installation

C.

In-place upgrade

D.

Clean installation

Question 69

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Options:

A.

Acceptable use policy violations

B.

Server configuration

C.

Chain of custody

D.

Data loss incidents

Question 70

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

Options:

A.

Inform management regarding the anticipated amount of downtime

B.

Document a backout plan to roll back changes to the router

C.

Configure a redundant data path to eliminate downtime

D.

Make the downtime window larger than actually anticipated

Question 71

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

Options:

A.

Change the default access port

B.

Enforce password complexity

C.

Put the terminal server into the router’s DMZ

D.

Disable logon time restrictions

E.

Block all unused ports on the LAN smart switch

F.

Use the local client certificate for server authentication

Question 72

A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?

Options:

A.

Enable System Restore and create a restore point so no data is lost

B.

Educate the user about how to avoid malware in the future

C.

Update the antivirus software and run a full system scan

D.

Move the infected system to a lab with no network connectivity

Question 73

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

Options:

A.

Spyware

B.

Zombies

C.

Virus

D.

Ransomware

E.

Worm

F.

Botnet

Question 74

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?

Options:

A.

Devices and Printer

B.

Sync Center

C.

Device Manager

D.

Power Option

Question 75

A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?

Options:

A.

Connect to the network and update the OS with the latest security patches

B.

Scan and dean the USB device used to transfer data from the equipment

C.

Disable System Restore and remove all restore points from the system

D.

Update the local antivirus and set it to scan automatically every evening

Question 76

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

Options:

A.

The computer has GRUB Legacy installed

B.

Windows Startup services are not running

C.

An incompatible partition is marked as active

D.

An unsupported version of Windows is installed

Question 77

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

Options:

A.

Remove applications from startup

B.

Defragment the hard drive

C.

Install additional RAM

D.

Install a faster hard drive

E.

End the processes in Task Manager

F.

Run the Disk Cleanup utility

Question 78

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?

Options:

A.

Files disappearing

B.

File permission changes

C.

Application crash

D.

Too many startup items

Question 79

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

Options:

A.

GPT

B.

Dynamic

C.

Basic

D.

Extended

Question 80

A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

Options:

A.

ping

B.

nslooking

C.

net use

D.

ipconfig

Question 81

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hot-spot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?

Options:

A.

Joe’s data transmission is over the limit

B.

The phone needs to be rebooted from overuse

C.

The use of GPS interferes with data speeds

D.

There is unintended Bluetooth pairing.

Question 82

A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

Options:

A.

Air filters

B.

Privacy screens

C.

Vacuums

D.

ESD mats

Question 83

Joe, an end user, has been prompted to provide his username and password to access the payroll system.

Which of the following authentication methods is being requested?

Options:

A.

Single-factor

B.

Multifactor

C.

RADIUS

D.

TACACS

Question 84

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?

Options:

A.

Backout plan

B.

Contingency plan

C.

Alternative plan

D.

Backup plan

Question 85

Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.

She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

Options:

A.

There is unauthenticated wireless connectivity

B.

She has exceeded the data allowance

C.

The phone is only 3G capable

D.

It is an unrooted phone

E.

The SIM card was not activated

F.

A data plan was not purchased

Question 86

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

Options:

A.

Visit the Microsoft Update website to see if there is an issue with a specific update

B.

Look up the error number associated with the failed update

C.

Look at the system Event Viewer to find more information on the failure

D.

Download the failed update to install manually

Question 87

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

Options:

A.

UPS

B.

Server rack

C.

PoE phone

D.

Desktop printer

E.

Modem

F.

Patch panel

Question 88

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

Options:

A.

Remove any proxy servers configured on the user’s browsers.

B.

Assist the user with purchasing an SSL certificate and save the certificate to the desktop.

C.

Disable the SPI firewall on the office’s gateway and any other routers.

D.

Instruct the user to ignore the certificate error since the user is connecting to a secure website.

E.

Create an outbound rule in Windows Firewall named after the user’s homepage.

F.

Run anti-malware scans and download the latest Windows updates.

Question 89

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

Options:

A.

Time Machine

B.

Snapshot

C.

System Restore

D.

Boot Camp

Question 90

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user’s request? (Select TWO)

Options:

A.

MAC filtering

B.

Default SSID

C.

Ratio power levels

D.

Content filtering

E.

Physical security

Question 91

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed?

Options:

A.

NTLDR not found

B.

No boot device available

C.

Operating system not found

D.

BIOS ROM checksum error

Question 92

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the

BEST choice for the technician to make?

Options:

A.

Politely ask the user to call back

B.

Ask another technician to take the call

C.

Troubleshoot the issue for the user

D.

Input the issue as a ticket and escalate to Tier 2

E.

Put the user on hold and troubleshoot after the scheduled break

Question 93

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

Options:

A.

Privacy – Maps

B.

Display – Brightness

C.

Storage – Photos

D.

Mail – Work

Question 94

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?

Options:

A.

Delete the user accounts

B.

Disable the user accounts

C.

Restrict the user accounts

D.

Reset the user accounts

Question 95

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?

Options:

A.

Mylar bags

B.

Cardboard boxes

C.

Antistatic containers

D.

Paper envelopes

Question 96

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?

Options:

A.

PSU alarm

B.

Humidity alarm

C.

Temperature alarm

D.

Motion alarm

Question 97

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.

Which of the following security measures should be used?

Options:

A.

Biometric device

B.

Common access card

C.

Cable lock

D.

Privacy screen

E.

Mantrap

Question 98

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.

Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.

Which of the following settings or features is responsible for the problems Ann is experiencing?

Options:

A.

Full device encryption

B.

Account lock

C.

Multifactor authentication

D.

Strong password requirements

Question 99

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.

When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

Options:

A.

gpupdate

B.

diskpart

C.

gpresult

D.

net use

Demo: 99 questions
Total 665 questions