1/149
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following are system folders on macOS? (Select two)
Applications and FileVault
A technician needs to install an operating system on a large number of workstations. Which
of the following is the fastest method?
Image deployment
An organization sees unauthorized apps installed and licensing prompts. What should the
security team do?
Remove users from the local admin group.
An administrator received an email stating that the OS they are currently supporting will no
longer be issued security updates and patches. Which of the following is most likely the
reason the administrator received this message?
The OS will be considered end of life
A user is unable to use the latest version of an app on a legacy tablet. What is the most likely
reason?
The OS is end-of-life
A company would like to deploy baseline images to new computers as they are started up on
the network.
Which of the following boot processes should the company use for this task?
PXE
A technician completes the installation of an OS that appears to be successful. However,
when the technician removes the USB drive that was used for the installation and restarts the
system, the error "No boot device found" appears. Which of the following should the
technician do next to resolve the issue?
Enable UEFI devices in the BIOS
Which of the following concepts should a technician consider when discussing confidential
work projects with individuals outside the company?
NDA
A secretary receives an email from the company's chief executive officer with a request to
pay a vendor immediately. After the payment is made, the CEO informs the secretary that
they never sent that email. Which of the following social engineering tactics best describes
this type of attack?
Whaling
A technician needs to download and install a new web browser on a desktop. Which attribute
should be used to verify the installer's authenticity?
Hash
An administrator received an email stating that the OS they are currently supporting will no
longer be issued security updates and patches. Which of the following is most likely the
reason the administrator received this message?
The OS will be considered end of life
Which of the following types of social engineering attacks sends an unsolicited text message
to a user's mobile device?
Smishing
An administrator is investigating a technical outage. The management team wants
information that includes the summary of the outage and actions taken. Which of the
following documentation should the administrator provide?
Incident report
A help desk technician is setting up speech recognition on a Windows system. Which of the
following settings should the technician use?
Ease of Access
Which of the following file types would a desktop support technician most likely use to
automate tasks for a Windows user log-in?
.bat
Which of the following is the best reason for a network engineering team to provide a help
desk technician with IP addressing information to use on workstations being deployed in a
secure network segment?
DHCP services are not enabled for this subnet.
A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop
technician finds the following information:
Battery charge: 25%
Battery health: 90%
Hotspot: On
Mobile reception: |||
Roaming: Off
Used space: 63.76GB/64GB
Which of the following is the cause of the issue?
The device is running out of free space
After using a third-party disk optimization software package, a technician restarts a laptop
and receives the message "No operating system found." The technician verifies that the
BIOS properly recognizes the SSD.
Which of the following should the technician do next?
Boot from installation media and repair the MBR
A user takes an iOS-based smartphone to a repair shop due to performance issues. The
technician observes:
Battery charge: 25%
Battery health: 90%
Hotspot: On
Used space: 63.76GB / 64GB
Which of the following is the most likely cause of the performance issue?
The device is running out of free space
A technician needs to provide remote support for a legacy Linux-based operating system
from their Windows laptop. The solution needs to allow the technician to see what the user is
doing and provide the ability to interact with the user's session. Which of the following remote
access technologies would support the use case?
VNC
A technician is using a credential manager to safeguard a large number of credentials. Which
of the following is important for using this application?
Secure master password
A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a
new computer.
Which of the following specifications will help the specialist determine which OS architecture
to use?
16GB RAM
A security administrator teaches all of an organization's staff members to use BitLocker To
Go. Which of the following best describes the reason for this training?
To ensure that all removable media is password protected in case of loss or theft
A technician needs to change hibernation settings on a Windows computer via a batch file.
Domain policies are unavailable. Which is the best method?
Use the powercfg command in PowerShell
A user's application only works with a legacy version of the OS. The OS is reaching its endof-life date. For security reasons, the company is migrating to the current version of the OS.
Which of the following is the most efficient way to complete the migration while maintaining
accessibility to the application?
Virtualization
Which of the following describes a vulnerability that has been exploited before a patch or
remediation is available?
Zero-day
A user decides to switch to Windows from Linux and is trying to migrate data using an
external USB hard disk. However, when the user connects the cable to the Windows
machine, an error message appears stating the device must be formatted before it can be
used. The hard disk works as expected when connected to the Linux machine. Which of the
following should the user do to resolve this issue?
Update the file allocation system to exFAT
A technician needs to disable guest log-ins on domain-joined desktop machines. Which of
the following should the technician use?
Group Policy
An organization is experiencing an increased number of issues. A technician notices
applications that are not installed by default. Users are reporting an increased number of
system prompts for software licensing. Which of the following would the security team most
likely do to remediate the root cause?
Enable stricter UAC settings on Windows.
Which of the following methods involves requesting a user's approval via a push notification
to verify the user's identity?
SMS
A technician uses AI to draft a document about new software benefits. Upon reading, the
technician sees factually incorrect info. What term best describes this?
Hallucinations and Potentially unwanted program
A user is working from home and is unable to access work files on a company laptop. Which
of the following should a technician configure to fix the network access issue?
Virtual private network
After completing malware removal steps, what is the next step the technician should take?
Educate the end user
A user's new smartphone is not staying charged throughout the day. The smartphone
charges fully every night. Which of the following should a technician review first to
troubleshoot the issue?
Background applications
An end user wants to have a sales printer added to their computer. The printer is on the
domain. Which of the following is the best method for the technician to add the printer?
Go to Local Users and Groups to add the printer
A help desk team was alerted that a company-owned cell phone has an unrecognized
password-cracking application. Which of the following should the help desk team do to
prevent further unauthorized installations from occurring?
Deploy MDM
A network technician notices that most of the company's network switches are now end-oflife and need to be upgraded. Which of the following should the technician do first?
Propose the change
A technician verifies that a malware incident occurred on some computers in a small office.
Which of the following should the technician do next?
Quarantine the infected systems
A technician needs to configure laptops so that only administrators can enable virtualization
technology if needed. Which of the following should the technician configure?
BIOS password
A town clerk wants to work from home and access documents on a town hall server. What
should a technician set up?
VPN
A technician is setting up a surveillance system for a customer. The customer wants access
to the system's web interface on the LAN via the system's IP address. Which of the following
should the technician use to prevent external log-in attempts from the internet?
Static IP
What is found in an MSDS (Material Safety Data Sheet) for a battery backup?
Emergency procedures
Which of the following methods involves requesting a user's approval via a push notification
to verify the user's identity?
Authenticator
A help desk technician needs to remove RAM from retired workstations and upgrade other
workstations that have applications that use more memory with this RAM. Which of the
following actions would the technician most likely take?
Use antistatic bags for storage and transport.
A customer's computer does not have an active connection to the network. A technician goes
through a few troubleshooting steps but is unable to resolve the issue. The technician has
exhausted their knowledge. The customer expresses frustration at the time taken to resolve
this issue. Which of the following should the technician do?
Escalate the issue to a senior team member and provide next steps to the customer.
Technicians are failing to document user contact information, device asset tags, and a clear
description of each issue in the ticketing system. Which of the following should a help desk
management team implement for technicians to use on every call?
Standard operating procedures
A company recently transitioned to a cloud-based productivity suite and wants to secure the
environment from external threat actors. Which of the following is the most effective method?
Multifactor authentication
A technician is setting up a Windows server to allow remote desktop connections for multiple
users. Which of the following should the technician configure on the workstation?
Firewall
Disk: 2%
Network: 12%
GPU: 15%
CPU: 70%
Memory: 97%
Which of the following would a technician most likely do to resolve the issue?
Close unnecessary programs
A user is attempting to open on a mobile phone a HD video that is hosted on a popular media
streaming website. The user is receiving connection timeout errors. The mobile reception
icon area is showing two bars next to 3G. Which of the following is the most likely cause of
the issue?
The bandwidth is not fast enough.
A technician is deploying mobile devices and needs to prevent access to sensitive data if the
devices are lost.
Which of the following is the best way to prevent unauthorized access if the user is unaware
that the phone is lost?
Remote wipe
Which of the following is the quickest way to move from Windows 10 to Windows 11 without
losing data?
In-place upgrade
A user is experiencing issues with outdated images while browsing websites. Which of the
following settings should a technician use to correct this issue?
Internet Options
A company wants to use a single operating system for its workstations and servers and avoid
licensing fees.
Which of the following operating systems would the company most likely select?
Linux
When a corporate laptop is connected to the company network, it can reach external
websites. However, it cannot reach any internal websites, displaying the error message
"Cannot reach this page." Which of the following should a technician configure?
DNS settings
Which of the following authentication methods is the best way to prevent users from
frequently entering their credentials?
Single sign-on
A Windows 11 Home device is receiving constant pop-ups about an urgent need to update
antivirus software to remove a detected threat. The user has been clicking the "X" button in
the window frame but it always reappears. The pop-up includes an "OK" button to install the
update and remove the threat. Which of the following should the user do next?
Verify the current status and settings of protection measures
A technician reviews an organization's incident management policy. The organization uses a
third-party vendor with multiple tools to protect its assets. What service type is this?
MDR
An employee is using a photo editing program. Certain features are disabled and require a
log-in, which the employee does not have. Which of the following is a way to resolve this
issue?
License assignment
A user has been adding data to the same spreadsheet for several years. After adding a
significant amount of data, they are now unable to open the file. Which of the following should
a technician do to resolve the issue?
Increase the amount of RAM.
An international traveler is concerned about others accessing the contents of their
smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following
additional security measures further reduces the risk of unauthorized data access?
Device encryption
A technician notices that the weekly backup is taking too long to complete. The daily backups
are incremental. Which of the following would most likely resolve the issue?
Running synthetic full weekly backups
Users are reporting that an unsecured network is broadcasting with the same name as the
normal wireless network. They are able to access the internet but cannot connect to the file
share servers. Which of the following best describes this issue?
Rogue wireless access point
Which of the following provides information to employees, such as permitted activities when
using the organization's resources?
AUP
A technician is securing a newly deployed workstation. Only authorized users should access
it. Which actions should the technician take? (Select two)
Apply the BIOS password and Enable screensaver locks
A technician follows proper malware removal procedures but cannot remove all malware.
They decide to reload the OS. What should they select?
Clean install
An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely
impact business.
The patch requires downtime. What should the administrator do?
Implement an emergency change.
Various alerts on a user's Windows 11 laptop are continually interrupting the user during
videoconference calls. Which of the following should a support technician recommend to best
solve the issue?
Set Windows Notifications settings to Do Not Disturb
Which of the following prevents forced entry into a building?
Bollard
A technician is installing a cloud-based productivity suite and gets an error saying the
installation is unavailable. What should be tried first?
Check the license device limit
A client reports that their browser's home page changed. Every time they run an internet
search, the results are returned from unfamiliar websites. Which of the following actions
should a technician take first to resolve the issue? (Select two)
Select all that apply!
Uninstall malicious extensions and Reset browser startup page
Which of the following is used to detect and record access to restricted areas?
Badge readers
A company executive is currently attending a major music festival with a large number of
attendees and is having trouble accessing a work email account. The email application is not
downloading emails and also appears to become stuck during connection attempts. Which of
the following is most likely causing the disruption?
Too many devices in the same area are trying to connect to the mobile network.
Which of the following methods would make data unrecoverable but allow the drive to be
repurposed?
Performing a low-level format
A user recently installed an application that accesses a database from a local server. When
launching the application, it does not populate any information. Which of the following
command-line tools is the best to troubleshoot the issue?
curl
A Microsoft OS laptop user frequently forgets their password. Which alternative login method
should a technician enable?
Windows Hello
Which of the following filesystem types does the Linux OS use?
ext4
Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive.
The user also notices that the title bar indicates the application is not responding. Which of
the following would a technician most likely inspect?
File size and related memory utilization
A help desk technician recently installed an SSH client on a workstation in order to access
remote servers.
What does this enable?
To securely establish a console session
After a user installs a mobile application from an advertisement, the phone's battery dies a
few hours later and becomes hot to touch, even when not in use. Which of the following
should a technician do first?
Run a mobile malware scan on the phone
A user reports some single sign-on errors to a help desk technician. Currently, the user is
able to sign in to the company's application portal but cannot access a specific SaaS-based
tool. Which of the following would the technician most likely suggest as a next step?
Use a private browsing window to avoid local session conflicts
A user has rooted their corporate phone to load unapproved software. Which of the following
tools should the company use to prevent access to the corporate network?
Mobile device management
Why would a network engineering team provide a help desk technician with IP addresses for
a wired network segment?
DHCP is not enabled for this subnet.
Which of the following is used to store passwords in macOS?
Keychain
The battery on a user's smartphone discharges quickly when the user travels. The
smartphone was replaced two weeks ago. Which of the following should a technician do first
?
Look for applications that are reporting the highest utilization
An employee is trying to connect their company laptop to airport Wi-Fi. A pop-up with the
airport logo appeared and was closed quickly. The internet does not work. What should a
help desk technician suggest?
Reconnect to the network and read the pop-up carefully
A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a
day. Which of the following should the technician use to determine the cause?
Event Viewer
Which of the following malware types typically has very high computing resource usage?
Cryptominer
Multiple users clicked a phishing link from a compromised email account. The security team
isolates and removes the threat. Then, the management team provides security awareness
training to the company. What step is this?
Provide user education.
A technician thinks that an application a user downloaded from the internet may not be the
legitimate one, even though the name is the same. The technician needs to confirm whether
the application is legitimate.
Which of the following should the technician do?
Compare the hash value from the vendor.
A Windows 11 Home device is receiving constant pop-ups about an urgent need to update
antivirus software in order to remove a detected threat. The user has been clicking the "X"
button but the window keeps reappearing. The pop-up includes an "OK" button to install the
update. What should the user do next?
Verify the current status and settings of protection measures
A customer is unable to open some files on their system. Each time the customer attempts to
open a file, the customer receives a message that the file is encrypted. Which of the following
best describes this issue?
Ransomware
Performance on a user's smartphone is degrading. Applications take a long time to start, and
switching between apps is slow. Which of the following diagnostic steps should a mobile
technician take first?
Uninstall unneeded applications
Technicians are failing to document user contact information, device asset tags, and a clear
description of each issue in the ticketing system. What should the help desk management
implement?
Standard operating procedures
A technician installs VPN client software that has a software bug from the vendor. After the
vendor releases an update to the software, the technician attempts to reinstall the software
but keeps getting an error message that the network adapter for the VPN already exists.
Which of the following should the technician do next to mitigate this issue?
Delete hidden network adapters.
MFA for a custom web application on a user's smartphone is no longer working. The last time
the user remembered it working was before taking a vacation to another country. Which of
the following should the technician do first?
Verify the date and time settings
A user's computer is running slowly. Task Manager shows:
Disk: 2%
Network: 12%
GPU: 15%
CPU: 70%
Memory: 97%
Which of the following would a technician most likely do to resolve the issue?
Close unnecessary programs
After a user installs a mobile application from an advertisement, the phone's battery dies a
few hours later, and it is hot to the touch, even when not in use. Which of the following should
a technician do first?
Run a mobile malware scan on the phone
A technician needs to map a shared drive from a command-line interface. Which of the
following commands should the technician use?
net use
A technician is troubleshooting an issue in which a service runs momentarily and stops at
certain points in the process. The technician needs to determine the root cause of this issue.
Which of the following tools should the technician use?
Event Viewer