Professor Messer, 220-1102, Practice Exam A

Practice Exam A - Professor Messer - 220-1102

1 / 85

The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire?

2 / 85

A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disable System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step?

3 / 85

A desktop administrator is upgrading the video adapter in a workstation. Which of the following should the administrator use during this process?

4 / 85

A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. The workstation configuration is:

1 GHz CPU
2 GB of RAM
15 GB of free storage space
1280 x 720 video resolution

Which of the following would allow this installation to proceed?

5 / 85

An organization has been tasked with increasing the minimum password length. A system administrator has created a policy to require all passwords to be at least ten characters long for all users. When testing this policy in the lab, a laptop computer allowed the creation of eight-character passwords. Which of the following commands should be used to apply this new policy on the laptop?

6 / 85

Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. The assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process?

7 / 85

Sam, a user in the accounting department, has opened a help desk ticket due to problems accessing the website of the company’s payroll service provider. While testing other website connections on Sam’s computer, the technician finds that many pop-up windows are displayed. Which of the following would be the BEST way for the technician to resolve this issue?

8 / 85

After booting, a laptop computer is showing a black screen instead of the normal Windows login prompt. The logs from the update server show drivers on the laptop were automatically updated overnight. Which of the following would be the BEST way to resolve this issue?

9 / 85

A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of accessing this data?

10 / 85

A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state?

11 / 85

The hard drive in a macOS desktop has failed and none of the data on the drive was recoverable. A new storage drive has now been installed. Which of the following should be used to restore the data on the computer?

12 / 85

A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system files are missing. Which of the following should be used to restore these missing files?

13 / 85

A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the rolling would be best NEXT troubleshooting step?

14 / 85

A user is attempting to AirDrop a document to an associate but they do not see any destination devices in their list of available AirDrop Locations.  Which of the following would be the MOST likely for this issue?

15 / 85

A system administrator needs to upgrade a training room of twenty systems to the latest Windows version. Which of the following would be the MOST efficient method of performing this upgrade process?

16 / 85

A network consulting firm is upgrading the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes required to support the upgrade. The proposal also describes the risk involved in the process of making this upgrade. Which of the following would be the LAST step in this upgrade?

17 / 85

A user in the accounting department has received this error message: "The print spooler service is not running." The user contacts the help desk and opens a ticket for assistance. The help desk technician performs some testing and identifies the issue. Which of these would be the best NEXT step?

18 / 85

A user has opened a help desk ticket regarding the battery life on their mobile phone.  The battery in the phone held a charge for most of the day prior to connecting to the corporate network.  The battery now only lasts about half a day and the back of the phone is warmer than usual.

The phone is configured as follows:
Storage:  216.2 GB or 512 GB used
Display and Brightness: Automatic
Wi-Fi: Enabled
VPN: Not connected
Low Power Mode: Disabled
Battery Maximum Capacity:  100%

Which of the following changes would have the BEST impact on battery performance?

19 / 85

A system administrator would like to require a specific password complexity for all Active Directory user. Which of the following would be the BEST way to complete this requirement?

20 / 85

In which of the following file types would a system administrator expect to see the command, ‘cd c:\source’?

21 / 85

A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue?

22 / 85

A data center manager requires each server to maintain a least fifteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement?

23 / 85

Jack, a user, is having problems with the 802.11 wireless connection on his iOS phone. Although there are names appearing in the network list, his phone does not show any connectivity to a wireless network. Jack has confirmed that airplane mode is not enabled, Bluetooth is one, and VPN is not enabled. Which of the following is the MOST likely reason for this lack of wireless connectivity?

24 / 85

A technician is troubleshooting a computer infected with a virus. The user thought they were opening a spreadsheet, but the file was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue?

25 / 85

A system administrator is creating a series of shared folders that should not be visible when users browse the network for available resources. What symbol should be added to the end of  a share name to provide this functionality?

26 / 85

A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST?

27 / 85

A help desk director would like to identify and track computer systems that have been returned for service or moved from one location to another. Which of the following would be the BEST solution for these requirements?

28 / 85

An employee has modified the NTFS permissions on a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. Which of the following is the reason for this issue?

29 / 85

A user has installed multiple applications over the last week. During the startup process, the computer now takes over fifteen minutes to display the Windows 10 desktop. Which of the following utilities would help the system administrator troubleshoot this issue?

30 / 85

A user has delivered a broken laptop to the help desk, and they are visibly upset and quite vocal about the problem they’re having. The user is also asking for a very specific repair that doesn’t appear to have any relationship to his issue. What’s the best way to handle this situation?

31 / 85

A system administrator is configuring a server to use eight bootable partitions on a  single SSD. Which of the following partition styles would be the BEST choice for this configuration?

32 / 85

A desktop administrator has determined that an employee in the corporate office has been using their computer to share copyrighted materials on the Internet. Which of the following should be the best NEXT step?

33 / 85

Sam, a user on the research and development team, reports that her computer displays the message “Missing operating system’ during boot. A technician runs hardware diagnostics and finds that the RAM, CPU, storage device, and power supply all pass the tests. The technician then finds that a connect USB flash drive was causing the issue. Which of the following would prevent this issue from occurring in the future?

34 / 85

Each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page?

35 / 85

A user purchased a copy of home tax software and has installed it on their company computer. This morning, the user logs in and finds that the tax software has been automatically removed from the system. Which of the following would be the MOST likely reason for this result?

36 / 85

A system administrator is adding an additional drive to a server and extending the size of an existing volume. Which of the following utilities would provide a graphical summary of the existing storage configuration?

37 / 85

A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would  provide access to these settings?

38 / 85

A network administrator needs to manage a switch and firewall in the local data center. Which of the following would be the BEST choice for this requirement?

39 / 85

A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fifteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue?

40 / 85

A company maintains data retention requirements of five years for all customer names, addresses, and phone numbers.  Which of the following would BEST describe this data?

41 / 85

A security guard has reported a person was seen passing through the secure door without using a door badge. The intruder slipped through the door by closely following the person in front of them. Which of these would best describe these actions?

42 / 85

A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner’s access to this single server. Which of these would be the MOST important security task to perform on this server?

43 / 85

A financial corporation is deploying tablets to their salespeople in the field. The company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement?

44 / 85

An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user's password. Which of the following would describe this attack type?

45 / 85

A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this?

46 / 85

A technician is installing a new wireless network in a small remote office. Which of the following should the technician choose to provide the highest level of security on the network?

47 / 85

What is the maximum amount of RAM supported by a 32-bit version of an operating system?

48 / 85

A technician has been assigned a support ticket that urgently requests a laptop repair, but there are already many open support tickets ahead of this request. The technician doesn’t recognize the name associated with the ticket. Which of these choices would be the best path to take?

49 / 85

An office power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue?

50 / 85

Ad technician is installing a fresh Windows operating system on a file server. Unfortunately, the drive controller in the system is not recognized during the installation process. Which of the following would be the BEST way to manage this issue?

51 / 85

Daniel, a user in the finance department, has purchased a new Android smartphone and has installed a number of productively apps. After a day of use, Daniele finds the phone displaying a large number of advertisements when browsing the Internet. Which of the following tasks should Daniele perform after completing a factory reset?

52 / 85

A workstation on a manufacturing floor is taking much longer than normal to boot. Which of the following would be the BEST way to troubleshoot this issue?

53 / 85

A network administrator is configuring a wireless network at a small office. The administrator would like to allow wireless access for all computers but exclude a single kiosk in the lobby. Which of the following configuration settings would meet this requirement?

54 / 85

A user has noticed their system has been running very slowly over the last few days. They have also noticed files stored on their computer randomly disappear after the files are saved. The user has rebooted the computer, but the same problems continue to occur. Which of the following should the user perform to resolve these issues?

55 / 85

A system administrator is installing a new server into the metal racks in a data center.  During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST?

56 / 85

A Windows 10 user is installing a new application that also installs a service. Which of the following permissions will be required for this installation?

57 / 85

A computer on a manufacturing floor has been identified as a malware-infected system. Which of the following should be the best NEXT step to resolve this issue?

58 / 85

A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop?

59 / 85

A Linux administrator needs to modify the configuration text file for a service. Which of the following utilities would provide this functionality?

60 / 85

A healthcare company has replaced some of their desktop computers with laptops and will be disposing of the older computers. The security administrator would like to guarantee none of the existing data on the hard drives could be recovered once the systems are sent to the recycling center. Which of the following methods would meet this requirement?

61 / 85

An administrator is upgrading a Windows 8.1 Enterprise x64 computer to Windows 10. The user would like to maintain all applications and files during the upgrade process. Which of the following upgrade options would meet this requirement?

62 / 85

A user in the accounting department would like to ensure that their mobile device data is always available. If the user's smartphone is damaged or stolen, they would like to replace the device and restore all data as quickly as possible. Which of the following would provide this functionality?

63 / 85

A financial management company would like to ensure mobile users are configured with the highest level of wireless encryption while working in the office. They would also like to include an additional user verification step during the login process. Which of the following would provide this functionality? (Choose TWO)

64 / 85

A technician has been tasked with removing malware on a training room laptop. After updating the anti-virus software and removing the malware, the technician creates a backup of the system. After the training class ends, the technician is notified that the malware has returned. Which of the following steps was missed and caused the system to be infected again?

65 / 85

A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the MOST likely reason for this issue?

66 / 85

A user is using a smartphone at their desk, and they occasionally receive a security warning in the browser. After some additional troubleshooting, the technician determines the security warnings are fake. Which of the following should a technician follow to BEST resolve this issue?

67 / 85

A user in the sales department is attempting to upgrade the operating system of their smartphone, but the smartphone will not start the installation when selected. Which of the following is the MOST likely reason for this issue?

68 / 85

A user in the marketing department is using an application that randomly shuts down during normal use. When the problem occurs, the application suddenly disappears and no error messages are shown on the screen. Which of the following would provide the system administrator with additional information regarding this issue?

69 / 85

A system administrator is upgrading four workstations from Windows 8.1 to Windows 11. All of the user files and applications are stored on the server, and no documents or settings need to be retained between versions. Which of these installation methods would be the best way to provide this upgrade?

70 / 85

While using a laptop during presentations, a company vice president has found her system randomly locks up. While the problem is occurring, the screen continues to display the last presentation slide but none of the mouse or keyboard buttons will work. To regain control, the vice president must power down and reboot her computer. Which of the following would be the BEST option for troubleshooting this issue?

71 / 85

When connecting a new USB webcam to Windows 10, a message appears stating "The controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step?

72 / 85

Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details?

73 / 85

An internal audit has found that a server in the DMZ appears to be infected with malware. The malware does not appear to be part of a file in the OS, and the malware is started each time the system is started. What type of malware would be MOST likely found on this server?

74 / 85

A network administrator has configured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this configuration?

75 / 85

A user is connecting their laptop to an external monitor and keyboard, but the laptop goes into sleep mode if the laptop screen is shut. Which of the following would modify this configuration to keep the laptop running when the lid is closed?

76 / 85

A system administrator needs to view a set of application log files contained in a folder named "logs". Which of the following commands should be used to make this folder the current directory?

77 / 85

A technician is cleaning out a laser printer with a toner spill. Which of the following would be the MOST important for this cleaning process?

78 / 85

A security technician has identified malware running in the OS kernel. Traditional anti-malware scans were not able to identify any problems on the computer. Which of the following would be the BEST description of this malware?

79 / 85

Jack, a user, has opened a help desk ticket relating to desktop alerts randomly appearing throughout the day. Most of the alerts contain information about third-party products and services. Which of the following is the MOST likely cause of these messages?

80 / 85

A user has been provided with a username and password to access the corporate VPN. The user has also been provided with a hardware device displaying a six-digit code, and the code changes every 30 seconds. Which of the following would BEST describe the use of this device?

81 / 85

A user has opened a help desk ticket for application slowdowns and unwanted pop-up windows. A technician updates the anti-virus software, scans the computer, and removes the malware. The technician then schedules future scans and creates a new restore point. Which of the following should be the NEXT step in the removal process?

82 / 85

A technician has been called to resolve an issue with a networked laser printer, not printing. When the technician arrives on-site, they find the printer will require a hardware replacement. All hardware is managed by a third party and will take a week before the printer is operational again. Which of the following would be the technician's best NEXT step?

83 / 85

A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade?

84 / 85

Which of these Windows features provides full disk encryption for all data on a storage drive?

85 / 85

A system administrator has been asked to install a new application on a server, but the application is 64c-bit and the server operating system is 32-bit. Which of the following describes the issue associated with this installation?

Your score is

Flashcards

A system administrator is installing a new server into the metal racks in a data center.  During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST?

Equipment grounding

A user has opened a help desk ticket regarding the battery life on their mobile phone.  The battery in the phone held a charge for most of the day prior to connecting to the corporate network.  The battery now only lasts about half a day and the back of the phone is warmer than usual.

The phone is configured as follows:
Storage:  216.2 GB or 512 GB used
Display and Brightness: Automatic
Wi-Fi: Enabled
VPN: Not connected
Low Power Mode: Disabled
Battery Maximum Capacity:  100%

Which of the following changes would have the BEST impact on battery performance?

Enable auto-lock

A user in the accounting department has received this error message: "The print spooler service is not running." The user contacts the help desk and opens a ticket for assistance. The help desk technician performs some testing and identifies the issue. Which of these would be the best NEXT step?

Restart the spooler service

A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop?

Cable lock

Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. The assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process?

Face mask

A user is attempting to AirDrop a document to an associate but they do not see any destination devices in their list of available AirDrop Locations.  Which of the following would be the MOST likely for this issue?

Wi-Fi and Bluetooth are disabled

The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire?

Carbon dioxide extinguisher

Which of these Windows features provides full disk encryption for all data on a storage drive?

BitLocker

A company maintains data retention requirements of five years for all customer names, addresses, and phone numbers.  Which of the following would BEST describe this data?

PII

A user in the accounting department would like to ensure that their mobile device data is always available. If the user's smartphone is damaged or stolen, they would like to replace the device and restore all data as quickly as possible. Which of the following would provide this functionality?

Remote backup

Each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page?

Splash screen

A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would  provide access to these settings?

User Accounts

An office power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue?

Connect a surge suppressor to each system

What is the maximum amount of RAM supported by a 32-bit version of an operating system?

4 GB

Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details?

Event viewer

An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user's password. Which of the following would describe this attack type?

Brute Force attack

A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state?

Rollback plan

When connecting a new USB webcam to Windows 10, a message appears stating "The controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step?

Move the webcam to a different USB interface

A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of accessing this data?

Map the shared folder to an available drive letter

A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. The workstation configuration is:

1 GHz CPU
2 GB of RAM
15 GB of free storage space
1280 x 720 video resolution

Which of the following would allow this installation to proceed?

Increase free storage space to 32 GB

A security technician has identified malware running in the OS kernel. Traditional anti-malware scans were not able to identify any problems on the computer. Which of the following would be the BEST description of this malware?

Rootkit

A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the rolling would be best NEXT troubleshooting step?

Power cycle the tablets

A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fifteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue?

Slow profile load

A system administrator has been asked to install a new application on a server, but the application is 64c-bit and the server operating system is 32-bit. Which of the following describes the issue associated with this installation?

OS compatibility

A security guard has reported a person was seen passing through the secure door without using a door badge. The intruder slipped through the door by closely following the person in front of them. Which of these would best describe these actions?

Tailgating

A Linux administrator needs to modify the configuration text file for a service. Which of the following utilities would provide this functionality?

Nano

An internal audit has found that a server in the DMZ appears to be infected with malware. The malware does not appear to be part of a file in the OS, and the malware is started each time the system is started. What type of malware would be MOST likely found on this server?

Boot sector virus

A user has delivered a broken laptop to the help desk, and they are visibly upset and quite vocal about the problem they’re having. The user is also asking for a very specific repair that doesn’t appear to have any relationship to his issue. What’s the best way to handle this situation?

Repeat your understanding of the issue to the customer and provide an estimate and follow-up time

Daniel, a user in the finance department, has purchased a new Android smartphone and has installed a number of productively apps. After a day of use, Daniele finds the phone displaying a large number of advertisements when browsing the Internet. Which of the following tasks should Daniele perform after completing a factory reset?

Verify the source of each app before installation

A network administrator has configured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this configuration?

GCMP

A user has been provided with a username and password to access the corporate VPN. The user has also been provided with a hardware device displaying a six-digit code, and the code changes every 30 seconds. Which of the following would BEST describe the use of this device?

MFA

A user has installed multiple applications over the last week. During the startup process, the computer now takes over fifteen minutes to display the Windows 10 desktop. Which of the following utilities would help the system administrator troubleshoot this issue?

Task Manager

A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST?

Disconnect all power sources

A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this?

Regular format

A system administrator needs to view a set of application log files contained in a folder named "logs". Which of the following commands should be used to make this folder the current directory?

cd logs

A system administrator is configuring a server to use eight bootable partitions on a  single SSD. Which of the following partition styles would be the BEST choice for this configuration?

GPT

Ad technician is installing a fresh Windows operating system on a file server. Unfortunately, the drive controller in the system is not recognized during the installation process. Which of the following would be the BEST way to manage this issue?

Load third-party drivers

A user has noticed their system has been running very slowly over the last few days. They have also noticed files stored on their computer randomly disappear after the files are saved. The user has rebooted the computer, but the same problems continue to occur. Which of the following should the user perform to resolve these issues?

Install anti-malware software

A user in the sales department is attempting to upgrade the operating system of their smartphone, but the smartphone will not start the installation when selected. Which of the following is the MOST likely reason for this issue?

The smartphone storage is nearly full

The hard drive in a macOS desktop has failed and none of the data on the drive was recoverable. A new storage drive has now been installed. Which of the following should be used to restore the data on the computer?

Time machine

A user purchased a copy of home tax software and has installed it on their company computer. This morning, the user logs in and finds that the tax software has been automatically removed from the system. Which of the following would be the MOST likely reason for this result?

The user has installed a pesonal license

A system administrator is upgrading four workstations from Windows 8.1 to Windows 11. All of the user files and applications are stored on the server, and no documents or settings need to be retained between versions. Which of these installation methods would be the best way to provide this upgrade?

Clean install

A computer on a manufacturing floor has been identified as a malware-infected system. Which of the following should be the best NEXT step to resolve this issue?

Disconnect the network cable

A technician has been called to resolve an issue with a networked laser printer, not printing. When the technician arrives on-site, they find the printer will require a hardware replacement. All hardware is managed by a third party and will take a week before the printer is operational again. Which of the following would be the technician's best NEXT step?

Inform the user of the repair status

An administrator is upgrading a Windows 8.1 Enterprise x64 computer to Windows 10. The user would like to maintain all applications and files during the upgrade process. Which of the following upgrade options would meet this requirement?

Windows 10 Enterprise x64

A user in the marketing department is using an application that randomly shuts down during normal use. When the problem occurs, the application suddenly disappears and no error messages are shown on the screen. Which of the following would provide the system administrator with additional information regarding this issue?

Event viewer

A workstation on a manufacturing floor is taking much longer than normal to boot. Which of the following would be the BEST way to troubleshoot this issue?

Disable the startup applications

A Windows 10 user is installing a new application that also installs a service. Which of the following permissions will be required for this installation?

Administrator

A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the MOST likely reason for this issue?

Disconnected VPN

An employee has modified the NTFS permissions on a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. Which of the following is the reason for this issue?

Share permissions restrict access from remote devices

A healthcare company has replaced some of their desktop computers with laptops and will be disposing of the older computers. The security administrator would like to guarantee none of the existing data on the hard drives could be recovered once the systems are sent to the recycling center. Which of the following methods would meet this requirement?

Shred the drives

A technician has been assigned a support ticket that urgently requests a laptop repair, but there are already many open support tickets ahead of this request. The technician doesn’t recognize the name associated with the ticket. Which of these choices would be the best path to take?

Contact the end-user and determine the urgency of the repair

A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disable System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step?

Update the anti-virus signatures

A network administrator needs to manage a switch and firewall in the local data center. Which of the following would be the BEST choice for this requirement?

SSH

A user is using a smartphone at their desk, and they occasionally receive a security warning in the browser. After some additional troubleshooting, the technician determines the security warnings are fake. Which of the following should a technician follow to BEST resolve this issue?

Run an anti-malware scan on the smartphone

Sam, a user on the research and development team, reports that her computer displays the message “Missing operating system’ during boot. A technician runs hardware diagnostics and finds that the RAM, CPU, storage device, and power supply all pass the tests. The technician then finds that a connect USB flash drive was causing the issue. Which of the following would prevent this issue from occurring in the future?

Modify the BIOS boot order

Jack, a user, has opened a help desk ticket relating to desktop alerts randomly appearing throughout the day. Most of the alerts contain information about third-party products and services. Which of the following is the MOST likely cause of these messages?

Adware

In which of the following file types would a system administrator expect to see the command, ‘cd c:\source’?

.bat

A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system files are missing. Which of the following should be used to restore these missing files?

Sfc

A desktop administrator has determined that an employee in the corporate office has been using their computer to share copyrighted materials on the Internet. Which of the following should be the best NEXT step?

Retrieve and securely store the computer

A system administrator would like to require a specific password complexity for all Active Directory user. Which of the following would be the BEST way to complete this requirement?

Group Policy

A system administrator is creating a series of shared folders that should not be visible when users browse the network for available resources. What symbol should be added to the end of  a share name to provide this functionality?

$ (Dollar Sign)

Jack, a user, is having problems with the 802.11 wireless connection on his iOS phone. Although there are names appearing in the network list, his phone does not show any connectivity to a wireless network. Jack has confirmed that airplane mode is not enabled, Bluetooth is one, and VPN is not enabled. Which of the following is the MOST likely reason for this lack of wireless connectivity?

The Wi-Fi password is incorrect

A desktop administrator is upgrading the video adapter in a workstation. Which of the following should the administrator use during this process?

Anti-static strap

A help desk director would like to identify and track computer systems that have been returned for service or moved from one location to another. Which of the following would be the BEST solution for these requirements?

Asset tags

A technician is troubleshooting a computer infected with a virus. The user thought they were opening a spreadsheet, but the file was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue?

Hide extensions for known file types

A financial management company would like to ensure mobile users are configured with the highest level of wireless encryption while working in the office. They would also like to include an additional user verification step during the login process. Which of the following would provide this functionality? (Choose TWO)

Multi-factor authentication

A network consulting firm is upgrading the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes required to support the upgrade. The proposal also describes the risk involved in the process of making this upgrade. Which of the following would be the LAST step in this upgrade?

End-user acceptance

An organization has been tasked with increasing the minimum password length. A system administrator has created a policy to require all passwords to be at least ten characters long for all users. When testing this policy in the lab, a laptop computer allowed the creation of eight-character passwords. Which of the following commands should be used to apply this new policy on the laptop?

Gpupdate

A technician has been tasked with removing malware on a training room laptop. After updating the anti-virus software and removing the malware, the technician creates a backup of the system. After the training class ends, the technician is notified that the malware has returned. Which of the following steps was missed and caused the system to be infected again?

Disable System Restore before removal

A data center manager requires each server to maintain a least fifteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement?

UPS

A financial corporation is deploying tablets to their salespeople in the field. The company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement?

Use full device encryption

A system administrator is adding an additional drive to a server and extending the size of an existing volume. Which of the following utilities would provide a graphical summary of the existing storage configuration?

Disk management

While using a laptop during presentations, a company vice president has found her system randomly locks up. While the problem is occurring, the screen continues to display the last presentation slide but none of the mouse or keyboard buttons will work. To regain control, the vice president must power down and reboot her computer. Which of the following would be the BEST option for troubleshooting this issue?

Check the Event viewer

A system administrator needs to upgrade a training room of twenty systems to the latest Windows version. Which of the following would be the MOST efficient method of performing this upgrade process?

Remote network installation

A user has opened a help desk ticket for application slowdowns and unwanted pop-up windows. A technician updates the anti-virus software, scans the computer, and removes the malware. The technician then schedules future scans and creates a new restore point. Which of the following should be the NEXT step in the removal process?

Educate the end user

A technician is cleaning out a laser printer with a toner spill. Which of the following would be the MOST important for this cleaning process?

Air filter mask

Sam, a user in the accounting department, has opened a help desk ticket due to problems accessing the website of the company’s payroll service provider. While testing other website connections on Sam’s computer, the technician finds that many pop-up windows are displayed. Which of the following would be the BEST way for the technician to resolve this issue?

Restore the workstation from a known good backup

A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner’s access to this single server. Which of these would be the MOST important security task to perform on this server?

Install the latest OS patches

A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade?

Sudo

A user is connecting their laptop to an external monitor and keyboard, but the laptop goes into sleep mode if the laptop screen is shut. Which of the following would modify this configuration to keep the laptop running when the lid is closed?

Power options

A network administrator is configuring a wireless network at a small office. The administrator would like to allow wireless access for all computers but exclude a single kiosk in the lobby. Which of the following configuration settings would meet this requirement?

MAC filtering

After booting, a laptop computer is showing a black screen instead of the normal Windows login prompt. The logs from the update server show drivers on the laptop were automatically updated overnight. Which of the following would be the BEST way to resolve this issue?

Start in VGA mode and roll back the driver

A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue?

Disable the user’s account

A technician is installing a new wireless network in a small remote office. Which of the following should the technician choose to provide the highest level of security on the network?

WPA3

Performance Based Questions