A technician is troubleshooting a Windows system in which an application works properly

QUESTION NO: 1
A customer is missing files from the Desktop and Documents folders after logging on to a PC. A technician looks in the Recycle Bin for the items, but nothing is there. Which of the following steps should the technician take NEXT?

A. Disable Update Services.

B. Reinstall the operating system.

C. Rebuild the user profile.

D. Disable application startup.

QUESTION NO: 2
A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update. A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Choose two.)

A. Force stop running applications

B. Perform a factory reset

C. Run application updates

D. Enable airplane mode

E. Update the PRL

F. Reset network settings

G. Roll back the OS update

QUESTION NO: 3
A macOS user reports seeing a spinning round cursor on a program that appears to be frozen.
Which of the following methods does the technician use to force the program to close in macOS?

A. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.

B. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.

C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit.

QUESTION NO: 4
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site.
Management asks the IT staff to take action to prevent this from reoccurring.
Which of the following would BEST accomplish this goal?

A. Use an antivirus product capable of performing heuristic analysis

B. Disallow the password caching of accounts in the administrators group

C. Use a host-based intrusion detection system on each computer

D. Install a UTM in between PC endpoints to monitor for suspicious traffic

E. Log all failed login attempts to the PCs and report them to a central server

QUESTION NO: 5
A technician is setting up a laptop for a company. The company is very concerned about data loss after one of a laptops was stolen. Which of the following security best practices should be implemented to address this concern?

A. Enable full disk encryption.

B. Configure a BIOS password.

C. Configure a failed-attempts lockout.

D. Disable AutoRun.

QUESTION NO: 6
A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem.
Which of the following should the technician do FIRST?

A. Contact the application vendor support staff for more information

B. Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart

C. Boot into safe mode, and then load the ERD and restore the most recent files

D. Log in as an administrative user and determine if the problem persists

QUESTION NO: 7
While installing a hard drive in a server, the administrator installs an extra physical hard disk.
Which of the following technologies will allow the administrator to extend an existing volume onto the extra disk?

A. Dynamic partitioning

B. Swap partition

C. RAID Level 5

D. Disk defragmenter

QUESTION NO: 8
Joe. a technician imaged a laptop using third-party software, but the drive is now showing a smaller partition size than the installed disk space.
Which of the following utilities will allow Joe to resize the partition using a graphical interface?

A. DxDiag

B. Disk Management

C. Device Manager

D. DiskPart

QUESTION NO: 9
A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.
Which of the following should the technician do to remove the threat from the system?

A. Remove and reinstall the web browser In safe mode.

B. Remove all lines that are not comments from the hosts file

C. Remove all parameters after the FQDN website address

D. Remove all files from the temporary folder and restart the computer.

QUESTION NO: 10
A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password.
A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts:
The user profile for Userl5 could not be loaded. Ntuser.dat is missing or corrupt.
Which of the following would be MOST appropriate for resolving this issue?

A. Go into System -> Advanced System Settings and remove the User15 profile.

B. Boot into safe mode and log in as User15 Remove extraneous startup programs

C. Delete the C:\Users\User15\ directory from the computer.

D. Run the command sfc /scannow.

QUESTION NO: 11
A user is unable to access corporate email on a smartphone. After the user launches the email application, it crashes and does not display the expected inbox. Additionally, the user reports other applications are running slowly.
Which of the following should the technician do NEXT?

A. Check the number of applications running on the smartphone.

B. Completely drain the smartphone's battery, and then fully charge it.

C. Calibrate the smartphone's touch screen.

D. Verify the user's email credentials.

E. Ensure the smartphone is not in airplane mode.

QUESTION NO: 12
A technician is installing a Linux operating system and is prompted to select the filesystem.
Which of the following filesystems should the technician choose?

A. HFS

B. Ext4

C. FAT32

D. NTFS

QUESTION NO: 13
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Select two.)

A. format

B. dism

C. chdsk

D. diskpart

E. ipconfig

F. dir

QUESTION NO: 14
A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS, and deliver malicious payloads across the network. Which of the following security measures would have been BEST to prevent the attack from being executed in the first place' (Select TWO)

A. Implementing automatic screen locks after 60 seconds of inactivity

B. Enabling the Secure Boot option

C. Creating a strong BIOS'UEFI password

D. Changing the default administrator credentials

E. Using a host-based antivirus with real-time scanning

F. Disabling AutoRun for USB devices

QUESTION NO: 15
A Linux user report that an application will not open and gives the error only one instance of the application may run at one time.
A root administrator logs on ot the device and opens terminal.
Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

A. Op and rm

B. Ps and kill

C. Pad and chmod

D. Is an chown

E. Node and vi

QUESTION NO: 16
A technician implemented a network policy to deploy a printer over the network. A user reports being unable to see the printer. Which of the following should the technician perform to map the printer to user laptops?

A. netstat

B. net use

C. gpupdate

D. gpresult

QUESTION NO: 17
A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?

A. HFS

B. EW2

C. FAT32

D. NTFS

QUESTION NO: 18
Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

A. Download antivirus updates

B. Quarantine the affected systems

C. Perform hardware diagnostics

D. Update the device drivers

QUESTION NO: 19
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

A. ACLs

B. Email filtering

C. VPN

D. Antivirus

E. Firewall

QUESTION NO: 20
A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user's laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network?

A. Add a country code exception to the firewall

B. Change the proxy settings

C. Unmap all network drives

D. Enable Remote Assistance

QUESTION NO: 21
A technician asks a customer who wants to purchase a new computer a series of open-ended questions. The technician determines the customer wants to use the system mainly to experiment with cross-platform software development using community-maintained tools and strongly prefers an open system. Which of the following should the technician recommend?

A. Windows OS

B. Linux OS

C. CentOS

D. Mec OS

QUESTION NO: 22
A technician is updating a Linux server that had been in storage. After booting into single-user mode, a command is issued that displays the technician's current location in the filesystem.
Which of the following commands was issued?

A. pwd

B. passwd

C. grep

D. apt-get

QUESTION NO: 23
A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection. Which of the following will the technician MOST likely use to connect to the server?

A. SSH

B. Telnet

C. RDP

D. Remote Assistance

QUESTION NO: 24
A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?

A. Task Scheduler

B. Drive Status

C. Device Manager

D. Performance

QUESTION NO: 25
A user recently browsed several online shopping sites on a computer. Since then, the user has been experiencing pop-ups that appear in the browser. The pop-ups also display in the right corner of the screen without the browser open.
Which of the following should the technician do to remove the pop-ups?

A. Apply OS security updates.

B. Boot the computer in safe mode and run chkdsk.

C. Enable a firewall.

D. Run an anti-malware application

QUESTION NO: 26
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?

A. Air filters

B. Privacy screens

C. ESD mats

D. Vacuums

QUESTION NO: 27
A desktop technician is responsible for the OS migration of 300 end users.
As part of the migration, the technician must save the end users* data to a temporary shared drive.
The data must include any hidden files to ensure 100% of the data is retained.
Which of the following commands will achieve this result by default?

A. xcopy

B. cp

C. robocopy

D. copy

QUESTION NO: 28
A technician is implementing a change to a piece of production environment. The change is causing other several other problem to occur. Which of the following should the technician do NEXT?

A. Complete a risk analysis of the new changes and their potential impact on other systems.

B. Complete the change to the prod ction environment within the allotted time frame.

C. Attempt to recreate the issues in the QA environment troubleshoot them quickly.

D. Begin following the back-out plan that was outlined in the planning meeting.

QUESTION NO: 29
A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.)

A. Configure startup applications

B. Configure automatic updates

C. Configure BIOS to enable Wake-on-LAN

D. Configure BIOS to enable SSH

E. Configure remote desktop connection

F. Configure BIOS to enable PXE boot

QUESTION NO: 30
An office computer has been infected with malware.
Which of the following steps should be taken FIRST?

A. Quarantine the infected computer

B. Educate the user

C. Back up the hard drive

D. Run antivirus software

QUESTION NO: 31
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.
Which of the following is causing the error?

A. OS compatibility

B. Small hard drive

C. Folder permissions

D. Insufficient RAM

QUESTION NO: 32
A user's laptop screen goes Clank every time the keyboard and/or mouse are not active for five minutes. The user needs to change the settings for this option. Which of the following Control Panel utilities allows the user to make the adjustment?

A. Display settings

B. Sync Center

C. Power Options

D. Device Manager

QUESTION NO: 33
A customer is setting up a new cable modem and wireless router. The customer wants to be able to access a remote desktop while traveling.
Which of the following must be configured FIRST to enable this capability?

A. Disabling ports

B. Port forwarding

C. MAC filtering

D. Content filtering

QUESTION NO: 34
An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application.
Which of the following types of user accounts does the employee MOST likely have?

A. Guest

B. Administrator

C. Standard user

D. Limited user

E. Super user

QUESTION NO: 35
Which of the following features in Windows 10 combines the functionality from Windows 7 and Windows 8 while also introducing Metro-style applications?

A. Microsoft Edge

B. Start menu

C. SmartScreen Filter

D. User Account Control

QUESTION NO: 36
Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

A. .exe

B. .Up

C. .xlsx

D. .bat

E. .vbs

F. .txt

QUESTION NO: 37
A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.
Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

A. Low-level format

B. Standard format

C. Degaussing

D. Overwrite

QUESTION NO: 38
A user's PC became infected with a virus after the user attempted to open what appeared to be an MP3 file. Which of the following folder options MOST likely led to this issue?

A. Always show menus

B. how hidden files

C. Hide extensions for known file types

D. Always show icons, never thumbnails

QUESTION NO: 39
A technician is running Windows on a company's Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the post. Users are required to run both Windows and Mac operating system on their machines, but never at the same time.
Which of the following would be the BEST way to accomplish this?

A. Utilize Mission Control on the Mac workstations.

B. Install Boot Camp on the workstations

C. Install virtualization software.

D. Perform a PXE boot on the workstations.

QUESTION NO: 40
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue.
Which of the following should the technician do NEXT?

A. Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.

B. Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

C. Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.

D. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

QUESTION NO: 41
A technician has created a new fileshare for an organization. To maintain data security, all users should have read-only rights to the fileshare. Additionally, supervisors need to be able to write and delete files. After the technician has configured the fileshare, users can read documents, but supervisors cannot modify documents.
Which of the following utilities should the technician use to troubleshoot the issue?

A. Local Security Policy

B. Map Network Drive

C. Microsoft Management Console

D. User Account Control

QUESTION NO: 42
When hackers execute code against a vulnerability in the hope that it has not yet been addressed, this is known as a:

A. spoofing attack

B. zero-day attack

C. brute force attack

D. DDoS attack

QUESTION NO: 43
Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?

A. Single-factor

B. Multifactor

C. RADIUS

D. TACACS

Which of the following Windows tools is used to measure how well software and hardware are performing?

Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time? A Microsoft Management Console snap-in that can track activity by hardware and software to measure performance.

Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup?

Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup? The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.

Which log should you look in to find events triggered by Windows components such as a device driver failing to load or a problem with hardware?

Event Log: Check the System Log in Event Viewer for additional error messages that might help pinpoint the device or driver that is causing the error. For more information, see Open Event Viewer.

How can you eliminate the hard drive as the source of an application error?

To eliminate the hard drive as the source of an application error, use the Chkdsk command with the /r parameter to check the drive and recover data in bad sectors.