Professor Messer, 220-1102, Practice Exam B

5

Practice Exam B - Professor Messer - 220-1102

1 / 85

A graphics designer has been editing image files that have become increasingly large over the last few months. The designer is not receiving error messages from their graphics application complaining of low temporary file cache space. Which of the following would be the best NEXT step?

2 / 85

A system administrator is analyzing a problem with a USB flash drive on a Windows 10 computer. When the flash drive is inserted, the CPU utilization increases to 100%. The administrator would like to disable one of the computer's USB controllers for troubleshooting. Which of the following would provide this functionality?

3 / 85

Which of the following partition types limit a Windows installation to a maximum partition size of 2TB?

4 / 85

A system administrator would like to perform a Windows installation while users are away from their desks. Which of the following would be the BEST option for this installation?

5 / 85

A company has just performed annual laser printer maintenance and has accumulated hundreds of used toner cartridges. Which of the following would be the BEST way to dispose of the old cartridges?

6 / 85

A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information?

7 / 85

An employee used their tablet to take pictures of the company's newest product. Those pictures were posted on an industry rumor website the following week. Which of the following should be evaluated as the MOST likely security concern?

8 / 85

A server administrator has configured an automated process to back up VM snapshots each evening during non-working hours. The backups will be stored on a series of high-density tape drives. How can the administrator confirm that these backups will be useful when a server recovery is needed?

9 / 85

A system administrator needs to modify a file in the \Windows\Installer directory, but the folder doesn't appear in the file list. Which of these options would help the system administrator with this task?

10 / 85

A user on the sales team has opened a help desk ticket because of short battery times on a new company-provided tablet. When using the tablet, the battery only lasts a few hours before shutting off. Which of the following would be the BEST choices for improving the battery life? (Select TWO)

11 / 85

Which of these describes a free, open-source operating system?

12 / 85

A system administrator needs to configure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings?

13 / 85

A user is performing a series of Google searches, both the results pages are displaying links and advertisements from a different website. This issue occurs each time a Google search is performed. The same Google search on a different computer results in a normal Google results page. Which of the following would resolve this issue?

14 / 85

A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network?

15 / 85

A user on the marketing team is experiencing slower load times and ongoing sluggishness with applications on their laptop. A technician examines the Windows Update logs and finds the monthly updates are failing. Which of the following should be the best NEXT step for resolving this issue?

16 / 85

Which of these would be the BEST way to prevent an attacker from modifying default routes on a SOHO wireless network?

17 / 85

An administrator has identified and removed malware on a corporate desktop computer. Which of the following malware removal steps should be performed NEXT?

18 / 85

A technician is troubleshooting an issue with an iOS tablet randomly restarting during normal use. A check of the device shows no significant application updates and the operating system was upgraded to a new version three days ago. The user states the tablet was working normally last week. Which of the following would be the MOST likely reason for these random reboots?

19 / 85

A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numberous documents to an off-site file storage system. Which of the following would limit the scope of future exploits?

20 / 85

Jack, an executive, has a laptop that runs very slowly after login and continues running slowly throughout the day. Jack has complained that certain applications cannot be started and others will randomly crash. A check of the laptop shows that the memory utilization is very close to 100%. Which of the following would provide a short-term fix for this issue?

21 / 85

Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home?

22 / 85

A data center manager would like to ensure that a power fault on a server would not be harmful to employees. Which of the following would be the BEST choice for this requirement?

23 / 85

A user would like to install an image and photo editing program on their home computer, but they would prefer an application without a monthly subscription. Which of the following would be the BEST licensing option for this requirement?

24 / 85

A network administrator is installing a set of upgraded Internet routers in the data center. Which of the following would be the best choices to secure the access to the internal data center door? (Select TWO)

25 / 85

A desktop administrator is upgrading an older computer to support the 64-bit version of Windows 10 Pro. The computer currently has:

1 GHz CPU
1GB of RAM
50 GB of free storage space
1024 x 768 video resolution

Which of the following should be upgraded to support the Windows 10 installation?

 

26 / 85

A user is receiving alerts on their desktop computer stating, "Access t this PC has been blocked for security reasons." A technician has determined this message was not created by the company's security software. Which of the following would be the best NEXT step in this troubleshooting process?

27 / 85

A company's shipping department maintains ten different computers to print shipping labels and track outgoing shipments. All of the systems are displaying an error when they access a third-party shipping management website over a secure connection. Which of the following would be the MOST likely a reason for this issue?

28 / 85

A user has dropped off a laptop to the help desk and states the laptop is experiencing a problem during the boot process. Which of these options would be the best path to resolve this issue?

29 / 85

A user has downloaded a browser add-on that assists with new car purchases. During the installation, the Windows UAC is requesting administrative permissions to continue with the install. Which of these is the MOST likely situation?

30 / 85

A user has noticed their mouse arrow has been moving around the screen without any intervention. The user has watched the mouse opening applications and changing setting in the Control Panel. Which of the following would be the BEST way for an administrator to resolve this issue?

31 / 85

A help desk technician needs to view and control the desktop of a Windows computer at a remote location. Which of the following would be the BEST choice for this task?

32 / 85

A user's video editing workstation often performs an overnight rendering process. On some mornings, the user is presented with a login screen instead of the rendering completion page. A technician finds the building occasionally poses power overnight. Which of the following should be used to avoid these issues with the video editing workstation?

33 / 85

A system administrator is installing a new video editing application on a user's workstation from an installation USB flash drive. However, the installation process fails due to a lack of available drive space. Which of the following would be the BEST way to complete the installation process?

34 / 85

A macOS user needs to encrypt all of the information on their laptop.  Which of the following would be the BEST choice for this requirement?

35 / 85

A manufacturing company in the United States sells monthly subscriptions from their website. Which of the following regulated data types would be the MOST important to manage?

36 / 85

A user is traveling to a conference, and they would like to be sure that any messages sent from their phone during the event remain private while using the event's wireless network. Which of the following should be configured on this user's phone?

37 / 85

A system administrator is troubleshooting an application issue. The application uses an increasing amount of memory until all available RAM is eventually depleted. The computer must be rebooted every few days when this memory issue occurs. Which of the following utilities would show how mush RAM is used by this application?

38 / 85

A user runs a corporate app on their smartphone that downloads a database each time the app is started. This download process normally take a few seconds, but today the download is taking minutes to complete. Which of the following should a technician follow as the best NEXT troubleshooting step?

39 / 85

A mobile user is using apps on their smartphone for all business tasks. To ensure that no data will be lost, the smartphone will need to have multiple backups each day. The user travels most of the time and rarely visits the home office. Which of the following would be the best way to provide these backups?

40 / 85

Jack, a user, has opened a help desk ticket to remove malware from his laptop. A previous removal occurred two weeks earlier with a similar malware infection. Which of the following was missed during the first malware removal?

41 / 85

A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and files are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer?

42 / 85

A manufacturing company performs a third-party audit of their accounting records each year. The auditors use laptops provided by the company to access internal resources. When the audit is complete, the auditors should be prevented from logging on until the following audit process begins. Which of the following would be the best way to accomplish this?

43 / 85

A technician is upgrading the motherboard in a server. Which of the following should be the FIRST task when beginning this upgrade?

44 / 85

A server administrator has been planning an operating system upgrade for a group of important services. The administrator has provided a detailed scope and risk assessment of the change, and the plan has been documented. However, the risk analysis wasn't completed until Friday afternoon, so the change cannot occur over the weekend. Which of the following is preventing the upgrade from occurring?

45 / 85

A user needs to modify a spreadsheet for an upcoming meeting. The spreadsheet is currently stored on a remote computer in a shared drive. The user would like to access the shared drive as a drive letter inside of Windows File Explorer. Which of the following command line options would provide this functionality?

46 / 85

A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation?

47 / 85

A user has called the help desk to get assistance with random blue screens on their Windows 10 laptop. The technician finds CPU utilization is constantly high, and many network sites are unavailable or only load half of the site content. The user mentions some random pop-up messages have appeared on the desktop during the workday. Which of the following would be the MOST likely reason for these issues?

48 / 85

Which of the following script extensions would commonly be used inside of a Microsoft Office applications?

49 / 85

Jack, a user in the accounting department, is having an issue with his smartphone reaching websites and retrieving mail when working from home. Inside the office, the phone appears to work normally. Which of the following would be the best NEXT step for troubleshooting this issue?

50 / 85

An organization has distributed new laptops to all of their home-office employees. Although the users at home can successfully connect through the internet to resources at the corporate office, there have been complaints that printers and shared drives at home are not accessible. Which of the following would explain this issue?

51 / 85

A Linux administrator is modifying a log file and needs to rename the file. Which of the following should be used to make this change?

52 / 85

A user is reporting some apps launched on their mobile phone will show an error message and then disappear without starting. This problem occurs with a group of apps normally used during the work day. Which of the following tasks would be the FIRST step for troubleshooting this issue?

53 / 85

A user in the shipping department has logged into the Windows domain. However, the desktop does not show the user's normal wallpaper and all of the user's spreadsheets and documents in the "My Documents" folder are missing. Which of these would be the BEST way to restore the user's normal work environment?

54 / 85

An IT manager would like to provide users with the option to recover daily versions of documents and spreadsheets. A user will have the option to roll back to any daily version in the last month. Which of the following would be the BEST way to implement this feature?

55 / 85

A system administrator has just updated fifty servers to the latest version of an application, and the updated software has been working as expected for the last three days. Which of the following change management steps should be followed NEXT?

56 / 85

A technician would like to modify a configuration in a user's UEFI BIOS, but the system will not provide a BIOS configuration hotkey after shutting down and powering on the computer. Which of the following would be the BEST way to address this issue?

57 / 85

A desktop administrator is troubleshooting an error that randomly causes a workstation to spike to 100% utilization. Which of these utilities would help the administrator track and report on system utilization over a 24-hour period?

58 / 85

A security administrator has been asked to reinstall Windows on a web server diagnosed with a rootkit infection. Which of the following installation methods would be the BEST choice for this server?

59 / 85

A data center manager is installing a new access door that will require multi-factor authentication. Which of the following should be used to meet this requirement? (Select TWO)

60 / 85

A macOS server administrator needs a backup system to allow the recovery of data from any point in the last thirty days. Which of the following should be used for this requirement?

61 / 85

A desktop administrator is troubleshooting poor performance on a user's laptop computer. The system takes an excessive amount of time during the boot process, and pop-up messages appear while using the word processor and spreadsheet applications. Which of the following steps should the technician do NEXT?

62 / 85

A user in the shipping department has received a call from someone claiming to be from the IT Help Desk. The caller asks the user to disclose their location, employee ID, and login credentials. Which of the following would describe this situation?

63 / 85

A system administrator has installed a SOHO network of five Windows computers. The administrator would like to provide a method of sharing documents and spreadsheets between all of the office computers. Which of the following would be the BEST way to provide this functionality?

64 / 85

A user in the accounting department has installed a new application for the upcoming tax year. Although the current application worked perfectly, the newer application runs significantly slower. Which of the following should be the FIRST troubleshooting step?

65 / 85

An administrator is troubleshooting a desktop computer experiencing a reboot issue. Before the Windows login screen appears, the system reboots in a continuous loop. Which of the following would be the BEST way to address this issue?

66 / 85

A user has opened a help desk ticket regarding the battery life in her three-year-old smartphone. If a power source is not available, the phone battery is usually depleted by the middle of the work day. She uses the smartphone to access resources across the VPN, send and receive email, and run company-related apps. Her average screen time during the day usually exceeds six hours. Which of the following would be the MOST likely reason for this battery issue?

67 / 85

A technician is delivering a new laptop to a user and moving the older laptop to a different user. Which of the following would allow the existing hard drive to be used but prevent recovery of any of the previous user's data?

68 / 85

A user would like to encrypt a small group of files in a shared folder without modifying other files on the drive. Which of the following would be the BEST way to accomplish this?

69 / 85

Why would a technician use an ESD strap?

70 / 85

A user has dropped off their laptop at the repair desk. A message taped to the laptop states: "Doesn't work." Which of the following would be the BEST next step?

71 / 85

A user in the accounting department has received an email asking for payment of an outstanding invoice and a link to a third-party payment site. The email contains purchase information that appears to be correct, but additional research shows that the invoice number is not valid. Which of the following would BEST describe this attack type?

72 / 85

A desktop administrator has just removed malware from a user's desktop computer and has configured the system to automatically update anti-virus signatures and perform a scan each night. Which of the following should be NEXT step in the removal process?

73 / 85

An administrator is troubleshooting an error message that appears each time an application is started. The administrator has uninstalled and reinstalled the application, but the error message still appears. Which of the following would be the BEST next troubleshooting step?

74 / 85

Which of the following Windows Share permissions has the priority when assigned access on a mapped drive?

75 / 85

A technician has been asked to power down and store a server that has been exploited by an external attacker. The legal department will be performing tests and gathering information from this server. Which of the following would be MOST important to ensure the integrity of the server data?

76 / 85

A technician has created a Windows image that can be used across all of the computers in a test lab. Which of the following would be the best way to deploy these images?

77 / 85

A system administrator has been tasked with locating all of the log files contained within an application folder. The folder currently contains over a thousand files, and only a portion of them have a .log extension. Which of these Windows commands would be the BEST way to find these files?

78 / 85

A network administrator has a report showing a single user with numerous visits to a website. This website is known to violate the company's AUP. Which of the following should the administrator do NEXT?

79 / 85

A server administrator is installing a 4TB drive in a database server and would like to use all free space as a single partition. Which of the following technologies should be used with this drive?

80 / 85

A manufacturing company is donating some older computers to a local charity. Which of the following should be done to ensure that the existing hard drives could still be used but non of the existing data would be recoverable?

81 / 85

A company is installing a new wireless access point in a conference room. Which of the following would provide the BEST security for this network?

82 / 85

A medical research company is using laptop computers when visiting test centers. The IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue?

83 / 85

Jack, a technician, is scheduled to replace a faulty motherboard today, but the motherboard delivery has been delayed and will not arrive until tomorrow. The new motherboard will repair a laptop used by a company executive. Which of the following would be the BEST way to handle these events?

84 / 85

A security administrator is installing a new VPN connection for remote users. The administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality?

85 / 85

A desktop administrator is moving as SSD from one laptop to another. Which of the following should be used to protect the SSD during the move?

Your score is

Flashcards

A technician is delivering a new laptop to a user and moving the older laptop to a different user. Which of the following would allow the existing hard drive to be used but prevent recovery of any of the previous user's data?

Regular format

A company has just performed annual laser printer maintenance and has accumulated hundreds of used toner cartridges. Which of the following would be the BEST way to dispose of the old cartridges?

Take to a hazardous waste facility

A user needs to modify a spreadsheet for an upcoming meeting. The spreadsheet is currently stored on a remote computer in a shared drive. The user would like to access the shared drive as a drive letter inside of Windows File Explorer. Which of the following command line options would provide this functionality?

net use

A macOS server administrator needs a backup system to allow the recovery of data from any point in the last thirty days. Which of the following should be used for this requirement?

Time Machine

Why would a technician use an ESD strap?

Prevent damage from static electricity

A desktop administrator is upgrading an older computer to support the 64-bit version of Windows 10 Pro. The computer currently has:

1 GHz CPU
1GB of RAM
50 GB of free storage space
1024 x 768 video resolution

Which of the following should be upgraded to support the Windows 10 installation?

 

RAM

Jack, a technician, is scheduled to replace a faulty motherboard today, but the motherboard delivery has been delayed and will not arrive until tomorrow. The new motherboard will repair a laptop used by a company executive. Which of the following would be the BEST way to handle these events?

Contact the end user and inform them of the shipping issue

A system administrator has been tasked with locating all of the log files contained within an application folder. The folder currently contains over a thousand files, and only a portion of them have a .log extension. Which of these Windows commands would be the BEST way to find these files?

dir

A user runs a corporate app on their smartphone that downloads a database each time the app is started. This download process normally take a few seconds, but today the download is taking minutes to complete. Which of the following should a technician follow as the best NEXT troubleshooting step?

Run a network speed check

A system administrator is analyzing a problem with a USB flash drive on a Windows 10 computer. When the flash drive is inserted, the CPU utilization increases to 100%. The administrator would like to disable one of the computer's USB controllers for troubleshooting. Which of the following would provide this functionality?

Device Manager

A user is reporting some apps launched on their mobile phone will show an error message and then disappear without starting. This problem occurs with a group of apps normally used during the work day. Which of the following tasks would be the FIRST step for troubleshooting this issue?

Power cycle the phone

A technician has been asked to power down and store a server that has been exploited by an external attacker. The legal department will be performing tests and gathering information from this server. Which of the following would be MOST important to ensure the integrity of the server data?

Maintain a chain of custody

Jack, a user, has opened a help desk ticket to remove malware from his laptop. A previous removal occurred two weeks earlier with a similar malware infection. Which of the following was missed during the first malware removal?

Educate the end-user

Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home?

Domain access

A medical research company is using laptop computers when visiting test centers. The IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue?

Full disk encryption

A user would like to encrypt a small group of files in a shared folder without modifying other files on the drive. Which of the following would be the BEST way to accomplish this?

EFS

A mobile user is using apps on their smartphone for all business tasks. To ensure that no data will be lost, the smartphone will need to have multiple backups each day. The user travels most of the time and rarely visits the home office. Which of the following would be the best way to provide these backups?

Use a cloud backup service

A desktop administrator is moving as SSD from one laptop to another. Which of the following should be used to protect the SSD during the move?

Anti-static bag

A user is performing a series of Google searches, both the results pages are displaying links and advertisements from a different website. This issue occurs each time a Google search is performed. The same Google search on a different computer results in a normal Google results page. Which of the following would resolve this issue?

Run a malware removal utility

Jack, a user in the accounting department, is having an issue with his smartphone reaching websites and retrieving mail when working from home. Inside the office, the phone appears to work normally. Which of the following would be the best NEXT step for troubleshooting this issue?

Verify the network configuration at home

A security administrator has been asked to reinstall Windows on a web server diagnosed with a rootkit infection. Which of the following installation methods would be the BEST choice for this server?

Clean install

A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network?

Configure WPA3 on the company network

A user in the shipping department has logged into the Windows domain. However, the desktop does not show the user's normal wallpaper and all of the user's spreadsheets and documents in the "My Documents" folder are missing. Which of these would be the BEST way to restore the user's normal work environment?

Rename the user's folder and delete their profile in the registry

A company's shipping department maintains ten different computers to print shipping labels and track outgoing shipments. All of the systems are displaying an error when they access a third-party shipping management website over a secure connection. Which of the following would be the MOST likely a reason for this issue?

The website certificate has expired

A manufacturing company performs a third-party audit of their accounting records each year. The auditors use laptops provided by the company to access internal resources. When the audit is complete, the auditors should be prevented from logging on until the following audit process begins. Which of the following would be the best way to accomplish this?

Disable the user accounts between audits

A manufacturing company is donating some older computers to a local charity. Which of the following should be done to ensure that the existing hard drives could still be used but non of the existing data would be recoverable?

Regular format

A user's video editing workstation often performs an overnight rendering process. On some mornings, the user is presented with a login screen instead of the rendering completion page. A technician finds the building occasionally poses power overnight. Which of the following should be used to avoid these issues with the video editing workstation?

Install a UPS

A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and files are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer?

defrag

A user is receiving alerts on their desktop computer stating, "Access t this PC has been blocked for security reasons." A technician has determined this message was not created by the company's security software. Which of the following would be the best NEXT step in this troubleshooting process?

Run an anti-malware utility

A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numberous documents to an off-site file storage system. Which of the following would limit the scope of future exploits?

Modify the default permissions

A technician has created a Windows image that can be used across all of the computers in a test lab. Which of the following would be the best way to deploy these images?

Repair installation

Which of the following Windows Share permissions has the priority when assigned access on a mapped drive?

Deny

A data center manager would like to ensure that a power fault on a server would not be harmful to employees. Which of the following would be the BEST choice for this requirement?

Electrical ground

A user in the shipping department has received a call from someone claiming to be from the IT Help Desk. The caller asks the user to disclose their location, employee ID, and login credentials. Which of the following would describe this situation?

Social engineering

A desktop administrator has just removed malware from a user's desktop computer and has configured the system to automatically update anti-virus signatures and perform a scan each night. Which of the following should be NEXT step in the removal process?

Enable system Protection

A security administrator is installing a new VPN connection for remote users. The administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality?

RADIUS

Which of the following partition types limit a Windows installation to a maximum partition size of 2TB?

MBR

A system administrator has just updated fifty servers to the latest version of an application, and the updated software has been working as expected for the last three days. Which of the following change management steps should be followed NEXT?

Document the changes

A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information?

Knowledge base

A server administrator is installing a 4TB drive in a database server and would like to use all free space as a single partition. Which of the following technologies should be used with this drive?

GPT

A user has called the help desk to get assistance with random blue screens on their Windows 10 laptop. The technician finds CPU utilization is constantly high, and many network sites are unavailable or only load half of the site content. The user mentions some random pop-up messages have appeared on the desktop during the workday. Which of the following would be the MOST likely reason for these issues?

Laptop has a malware infection

A technician is troubleshooting an issue with an iOS tablet randomly restarting during normal use. A check of the device shows no significant application updates and the operating system was upgraded to a new version three days ago. The user states the tablet was working normally last week. Which of the following would be the MOST likely reason for these random reboots?

Faulty OS upgrade

A system administrator needs to modify a file in the \Windows\Installer directory, but the folder doesn't appear in the file list. Which of these options would help the system administrator with this task?

File Explorer Options

A Linux administrator is modifying a log file and needs to rename the file. Which of the following should be used to make this change?

mv

A desktop administrator is troubleshooting poor performance on a user's laptop computer. The system takes an excessive amount of time during the boot process, and pop-up messages appear while using the word processor and spreadsheet applications. Which of the following steps should the technician do NEXT?

Disconnect the laptop from the network

Jack, an executive, has a laptop that runs very slowly after login and continues running slowly throughout the day. Jack has complained that certain applications cannot be started and others will randomly crash. A check of the laptop shows that the memory utilization is very close to 100%. Which of the following would provide a short-term fix for this issue?

Disable startup items

A help desk technician needs to view and control the desktop of a Windows computer at a remote location. Which of the following would be the BEST choice for this task?

RDP

A technician would like to modify a configuration in a user's UEFI BIOS, but the system will not provide a BIOS configuration hotkey after shutting down and powering on the computer. Which of the following would be the BEST way to address this issue?

Turn off Fast Startup

A user has noticed their mouse arrow has been moving around the screen without any intervention. The user has watched the mouse opening applications and changing setting in the Control Panel. Which of the following would be the BEST way for an administrator to resolve this issue?

Run an anti-virus scan

A server administrator has been planning an operating system upgrade for a group of important services. The administrator has provided a detailed scope and risk assessment of the change, and the plan has been documented. However, the risk analysis wasn't completed until Friday afternoon, so the change cannot occur over the weekend. Which of the following is preventing the upgrade from occurring?

Change board approval

A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation?

The date and time on the laptop is incorrect

A user on the sales team has opened a help desk ticket because of short battery times on a new company-provided tablet. When using the tablet, the battery only lasts a few hours before shutting off. Which of the following would be the BEST choices for improving the battery life? (Select TWO)

Disable Bluetooth and cellular connections

A system administrator would like to perform a Windows installation while users are away from their desks. Which of the following would be the BEST option for this installation?

Remote network installation

A user in the accounting department has installed a new application for the upcoming tax year. Although the current application worked perfectly, the newer application runs significantly slower. Which of the following should be the FIRST troubleshooting step?

Verify the requirements for the new application

A macOS user needs to encrypt all of the information on their laptop.  Which of the following would be the BEST choice for this requirement?

FileVault

A data center manager is installing a new access door that will require multi-factor authentication. Which of the following should be used to meet this requirement? (Select TWO)

Key fobs

A user has opened a help desk ticket regarding the battery life in her three-year-old smartphone. If a power source is not available, the phone battery is usually depleted by the middle of the work day. She uses the smartphone to access resources across the VPN, send and receive email, and run company-related apps. Her average screen time during the day usually exceeds six hours. Which of the following would be the MOST likely reason for this battery issue?

The battery capacity is decreased

An administrator has identified and removed malware on a corporate desktop computer. Which of the following malware removal steps should be performed NEXT?

Schedule periodic anti-virus scans

A graphics designer has been editing image files that have become increasingly large over the last few months. The designer is not receiving error messages from their graphics application complaining of low temporary file cache space. Which of the following would be the best NEXT step?

Increase available storage space

A network administrator is installing a set of upgraded Internet routers in the data center. Which of the following would be the best choices to secure the access to the internal data center door? (Select TWO)

Biometric lock

An administrator is troubleshooting an error message that appears each time an application is started. The administrator has uninstalled and reinstalled the application, but the error message still appears. Which of the following would be the BEST next troubleshooting step?

Check the Event Viewer logs

A user in the accounting department has received an email asking for payment of an outstanding invoice and a link to a third-party payment site. The email contains purchase information that appears to be correct, but additional research shows that the invoice number is not valid. Which of the following would BEST describe this attack type?

Phishing

A user has dropped off their laptop at the repair desk. A message taped to the laptop states: "Doesn't work." Which of the following would be the BEST next step?

Call the customer and ask for more information

Which of these describes a free, open-source operating system?

Linux

An IT manager would like to provide users with the option to recover daily versions of documents and spreadsheets. A user will have the option to roll back to any daily version in the last month. Which of the following would be the BEST way to implement this feature?

Create a file-level backup each day

A network administrator has a report showing a single user with numerous visits to a website. This website is known to violate the company's AUP. Which of the following should the administrator do NEXT?

Contact the company's security officer

Which of the following script extensions would commonly be used inside of a Microsoft Office applications?

.vbs

A system administrator has installed a SOHO network of five Windows computers. The administrator would like to provide a method of sharing documents and spreadsheets between all of the office computers. Which of the following would be the BEST way to provide this functionality?

Workgroup

An employee used their tablet to take pictures of the company's newest product. Those pictures were posted on an industry rumor website the following week. Which of the following should be evaluated as the MOST likely security concern?

Cloud storage

A manufacturing company in the United States sells monthly subscriptions from their website. Which of the following regulated data types would be the MOST important to manage?

Credit Card Transactions

A user is traveling to a conference, and they would like to be sure that any messages sent from their phone during the event remain private while using the event's wireless network. Which of the following should be configured on this user's phone?

VPN

A company is installing a new wireless access point in a conference room. Which of the following would provide the BEST security for this network?

WPA3

A server administrator has configured an automated process to back up VM snapshots each evening during non-working hours. The backups will be stored on a series of high-density tape drives. How can the administrator confirm that these backups will be useful when a server recovery is needed?

Perform occasional recovery tests

A system administrator needs to configure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings?

System

A user has dropped off a laptop to the help desk and states the laptop is experiencing a problem during the boot process. Which of these options would be the best path to resolve this issue?

Provide recommendations to the customer with proper technical IT explanations

A technician is upgrading the motherboard in a server. Which of the following should be the FIRST task when beginning this upgrade?

Disconnect from all power sources

A system administrator is installing a new video editing application on a user's workstation from an installation USB flash drive. However, the installation process fails due to a lack of available drive space. Which of the following would be the BEST way to complete the installation process?

Install the application to a network share

A user would like to install an image and photo editing program on their home computer, but they would prefer an application without a monthly subscription. Which of the following would be the BEST licensing option for this requirement?

Open-source

A system administrator is troubleshooting an application issue. The application uses an increasing amount of memory until all available RAM is eventually depleted. The computer must be rebooted every few days when this memory issue occurs. Which of the following utilities would show how mush RAM is used by this application?

Task Manager

An administrator is troubleshooting a desktop computer experiencing a reboot issue. Before the Windows login screen appears, the system reboots in a continuous loop. Which of the following would be the BEST way to address this issue?

Run Startup Repair from the Advance Boot Options

A user has downloaded a browser add-on that assists with new car purchases. During the installation, the Windows UAC is requesting administrative permissions to continue with the install. Which of these is the MOST likely situation?

The software is a Trojan horse

An organization has distributed new laptops to all of their home-office employees. Although the users at home can successfully connect through the internet to resources at the corporate office, there have been complaints that printers and shared drives at home are not accessible. Which of the following would explain this issue?

The corporate VPN is enabled

A user on the marketing team is experiencing slower load times and ongoing sluggishness with applications on their laptop. A technician examines the Windows Update logs and finds the monthly updates are failing. Which of the following should be the best NEXT step for resolving this issue?

Perform an anti-malware scan

A desktop administrator is troubleshooting an error that randomly causes a workstation to spike to 100% utilization. Which of these utilities would help the administrator track and report on system utilization over a 24-hour period?

Performance Monitor

Which of these would be the BEST way to prevent an attacker from modifying default routes on a SOHO wireless network?

Change the router's default password

Performance Based Questions