A user’s antivirus software is reporting several infections and prompting the user to pay full version to remove the threats. A technician notices the corporate approved antivirus software has not been upgraded in months. Which of the following should the technician do NEXT to remove the threat?
An end user set up a gaming server on an extra Windows PC. The user wants the PC to restart automatically during the night using the shutdown -r -£ command
Which of the following is the BEST tool to accomplish this?
A Computer Management
2B Task Scheduler b
C. Task Manager
D. Control Panel
Ann, an employee, recently reported to the company's IT technician that her smartphone is exhibiting strange behavior. When she opens the application store. an error appears that indicates there is no connection However, the phone still receives emails and can access the Internet from the browser. The phone was backed up recently and auto-connects to a VPN. Which of the following troubleshooting steps should the technician take NEXT? (Select TWO).
A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?
Which of the following account types account types enables and end user to install software without restrictions?
A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost Which of the following should be considered?
A user recently browsed several online shopping sites on a computer. Since then, the user has been experiencing pop-ups that appear in the browser. The pop-ups also display in the right
corner of the screen without the browser open. Which of the following should the technician do to remove the pop-ups?
Which of the following should be done prior to installing replacement RAM modules into a desktop computer?
A user can access the company's internal website properly, but some e-commerce websites have stopped loading and been replaced with an error message. The technician who is troubleshooting the issue tries to update the malware scanner over the network, but the automatic update fails. However, a manual update is successful from a USB drive. No viruses are detected on the device after a full system scan. Which of the following is the MOST likely cause of the issue?
Which of the following would MOST likely be used in secure client-server communication?
A user calls the help desk to report an issue accessing a new application on a Windows PC When the user tries to launch the application, an error message appears and then quietly disappears before the user can read it, Which of the following protocols would a technician MOST likely use to help diagnose this issue?
A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines?
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?
Many of the files in a user's network folder have a new file extension and are inaccessible. After some
troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a
large sum of money is required to decrypt them.
Which of the following should the technician do to recover the files?
To which of the following should a technician ground an ESD strap when adding memory to a workstation?
A technician is able to connect to a website: however, the technician receives the following error, when alternating to access a different website: Page cannot be displayed. Which of the following command line tools would be BEST to identify the root cause of the connection problem?
A technician is cleaning malware on a Windows workstation. Which of the following would MOST likely prevent a recurrence of the same malware?
A user needs to transfer some information from a work computer to a server. The user plugs a personal USB into the computer but is denied access to save information on the storage medium due to the security policy. This is an example of:
Ann a customer, allowed someone else to use her computer, and now some web pages do not display correctly in the browser A technician determines many of the browser settings live been changed Which of the following Control Panel utilities should the technician use to reset the browser settings to the defaults?
A technician is setting up a laptop for a company. The company is very concerned about data loss after one of a laptops was stolen. Which of the following security best practices should be implemented to address this concern?
A customer has called the help desk because a word processing application will no longer open. It was working fine earlier, but the user had to close a document quickly. An error message popped up about a network resource, and then the document crashed. Now, when the user clicks on the icon to launch the application, it does not give an error and will not open. Which of the following should a technician do FIRST?
An end user's laptop Is not as fast as when it was first purchased. The user wants it to revert to that point without losing any data. A technician examines the laptop and notices it has a magnetic hard drive. Which of the following can the technician do to make the laptop faster?
A customer has been using a computer to download and copy files to a USB flash drive. The customer accidentally stepped on the power strip, and the computer suddenly powered off. When the computer turned back on, it displayed an error message: No OS found. Which of the following should a technician perform NEXT?
A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software Which of the following would be MOST important during this phase of the request process?
A user's computer has been performing sluggishly The user reports the computer lakes a long time to be ready to use after powering it on A technician decides to use MSConfig to review the applications that might be causing the slowdown On which of the following should the technician focus'? (Select TWO).
A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?
A healthcare institute has asked the IT department to help protect medical and financial data. Which of the following regulations is the healthcare provider MOST concerned about? (Choose two.)
An IT manager receives a call from a user who states a technician completed work on a department laptop within the last week. The user indicates the technician tried to explain the issue
with the laptop, but the user was unable to understand because the technician used a lot acronyms. Additionally, the user claims the technician spoke too quickly when explaining the issue
and seemed preoccupied with a cell phone. The IT manager wants to address an email to the IT department to ensure the user's complaints are conveyed to the team. Which of the following
should the IT manager recommend in the email to the team? (Select TWO).
A technician is reinstalling Windows for a user and wants to keep the user's files and settings. Afterward, the user notices that personal files are no longer available and settings have been restored to default. Which of the following did the technician MOST likely execute to cause this issue?
A System reset
B. System update
C. System Restore
D. System refresh
A user reports that an application has been closing unexpectedly for the past two days when posting
transactions. When an administrator attempts to access the application, it generates an error stating a data
library is missing.
Which of the following should a technician attempt FIRST?
A user suspects a computer Is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware. Which of the following steps should the technician take NEXT to address the infection?
A user is unable to access certain files fram a specific folder. Which of the following commands should a technician use to modify the file permissions for a specific file?
After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications?
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?
A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?
An executive has contacted you through the help-desk chat support about an issue with a mobile device.
Assist the executive to help resolve the issue.
INSTRUCTIONS
Select the MOST appropriate statement for each response.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Let’s take a look at your phone settings.
Please change the port number on your mail settings to 993.
Which of the following should be done NEXT?
Which of the following key and mouse combinations can be used to run an application as a different user?
Which of the following attack types exploits vulnerabilities in human nature?
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?
A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)
A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?
The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.
Which of the following would be the MOST secure solution to this error?
A user spills a small amount of toner from a laser printer onto the floor. Which of the following is the safest way to clean up the toner?
An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?
Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?
A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?
A company wants to move the contents of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?
A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?
Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)
A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)
A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?
A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?
(Choose two.)
A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?
A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST?
A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?
Which of the following Windows versions introduced using applications in the Metro interface?
A corporate fileshare holds files for multiple departments. Individual users in each department create reports
that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that
encrypted all of the documents on the fileshare. The software asked for money to be transferred via
cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the
ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?
A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Select TWO)
What a user is allowed to do on a computer network would be addressed in:
When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?
A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?
A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?
A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files. Which of the following settings should the user change to resolve the issue?
A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which
of the following should the technician monitor during the installation?
An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish this quickly?
Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)
A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?
A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system Which of the following did the technician forget to do to prevent reinfection?
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.
Which of the following is MOST likely causing this error?
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hot-spot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?
During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?
Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.
She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)
A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user’s request? (Select TWO)
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed?
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the
BEST choice for the technician to make?
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.
The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:
Which of the following should be changed to resolve this issue?
A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?
A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.
Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?