Which tool would a technician use for troubleshooting in BIOS

Which of the following is the MAIN reason that corporate policies protect access to PII?A. To protect proprietary company dataB. To reduce the likelihood of identity theftC. To maintain the integrity of knowledge management systemsD. To limit access to those who “need to know”

Show

B. To reduce the likelihood of identity theft

A technician performs an in-place upgrade from Windows 7 to 8.1. After the upgrade is complete, a user reports that a frequently used file will not open. Instead, the user is prompted to search the Windows Store for an appropriate program to open the file. Which of the following should the technician do FIRST?A. Install the most recent Windows updatesB. Verify the USMT worked properlyC. Reconfigure the default program for the file typeD. Perform System RestoreE. Reinstall the program that is usually used to open the file

A. Install the most recent Windows updates

A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the technician can note the error message. The computer boots up normally, and the technician now wants to know which error message was displayed.Which of the following should the technician use to help troubleshoot the issue?A. sfcB. msconfigC. regedit32D. eventvwrE. msinfo32

An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use?A. cdB. mdC. scD. ftpE. mkdir

A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor’s support website. Which of the following is the BEST next step to resolve this issue?A. Uninstall the antivirus program and apply operating system patchesB. Utilize a different antivirus program and scan methodC. Format and reinstallD. Reinstall the antivirus program from a shared executable

B. Utilize a different antivirus program and scan method

Which of the following are examples of possession authentication? (Choose three.)A. Key fobB. RFID badgeC. PassphraseD. PINE. PasswordsF. SmartphoneG. Fingerprint reader

A. Key fobB. RFID badgeF. Smartphone

A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when initializing the drive for the machine to access all the disk space?A. GPTB. FAT32C. MBRD. exFAT

An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have?A. AdministratorB. GuestC. Super userD. Standard userE. Limited user

A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.)A. Configure remote desktop connectionB. Configure BIOS to enable Wake-on-LANC. Configure BIOS to enable SSHD. Configure automatic updatesE. Configure startup applicationsF. Configure BIOS to enable PXE boot

A. Configure remote desktop connectionB. Configure BIOS to enable Wake-on-LAN

A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is current. Which of the following tools should the technician use to find the current directory?A. dirB. sudoC. cdD. pwd

A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network. Which of the following provides the BEST solution with the LEAST administrative effort?A. PC backup and multiboot setupB. PC backup and system image deploymentC. PC backup and OS upgradeD. PC backup and clean install

B. PC backup and system image deployment

A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration?A. Multiheaded clientB. Thin clientC. Zero clientD. Thick client

A technician was told that 50 new computers were delivered. The company’s standard Windows image needs to be installed on all of them. Which of the following would be the MOST efficient way to get the image on all 50 computers?A. Multiboot installationB. Repair installationC. Unattended installationD. Clean installation

C. Unattended installation

A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from other companies outside its industry while allowing data to be shared with other companies in the same field. Which of the following is the BEST option to accomplish this task?A. PublicB. HybridC. CommunityD. Private

A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician has asked the domain administrator to exempt this policy for a computer that needs to have a USB digital camera installed. Once the domain administrator has exempted the computer from the policy, which of the following is the BEST command for the technician to run locally on the computer so the digital camera can be installed without waiting?A. grupdate /?B. grupdate /bootingsC. grupdate /forceD. grupdate /logoffE. grupdate /sync

A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?A. Remove and reinstall the applicationB. Hard reset the cell phoneC. Reconnect the wireless network connectionD. Close all running applications

B. Hard reset the cell phone

A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer states that NTLDR is missing. The computer cannot boot into safe mode, and reinstalling the OS is not an option. Which of the following is the BEST option to use to restore the machine to a bootable state?A. Remove the CMOS batteryB. Run Startup RepairC. Format the C driveD. Repair the MBR and then reboot

A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause?A. Faulty backlightB. High contrast modeC. Auto-brightnessD. Power saving mode

To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic?A. DHCP reservationsB. SSID broadcast deactivationC. MAC filteringD. Two-factor authentication

A user reports personal files have been renamed and are undecipherable. Images have been to the user’s folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user’s files?A. Perform a clean installation of WindowsB. Remove the malware and recover the files from a backupC. Initialize and repartition the hard drive to recover the filesD. Run safe mode to decrypt the user’s files

B. Remove the malware and recover the files from a backup

A user wants to connect a Windows notebook computer to an external desktop monitor, keyboard, and mouse. However, each time the user closes the notebook lid, the computer shuts down automatically. Which of the following options in the Power Settings menu should the technician select to prevent the automatic shutdown?A. Do nothingB. SleepC. HibernateD. Shut down

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?A. Domain name, location, IP addressB. Domain name, location, asset IDC. Asset ID, MAC addressD. Location, RFID

Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site’s IP address. Which of the following is MOST likely causing this issue?A. Proxy serverB. DHCP serverC. DNS serverD. SMTP server

A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user’s computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take?A. Update the anti-malware softwareB. Perform a malware scan in safe modeC. Set up scheduled scans and updatesD. Educate the end user on best practices

B. Perform a malware scan in safe mode

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 2000 Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15 Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:Network name:Joe’s HotspotSecurity:WPA2/PSKPassword:hotspotBand:2.4 GHzClient DHCP start address:192.168.23.1Which of the following is the MOST likely cause of the problem?A. Joe should be using WEP security on his hotspot for faster throughputB. Someone else is using Joe’s hotspot due to a weak passwordC. Joe’s hotspot gave him an invalid IP addressD. Joe is likely in a poor signal area and should try another area

B. Someone else is using Joe’s hotspot due to a weak password

A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement?A. IPSB. FTPSC. TPMD. DLP

A technician recently removed a malware infection from a client’s computer. After removing the computer from the network, the technician used an approved customized tool to remove the malware, then updated the antivirus suite, and performed a scan that reported the system was clean. A week later, the client reports the same malware infection has returned. Which of the following is MOST likely the cause of the reinfection?A. The technician did not disable the System Restore utilityB. The technician ran the malware remover before the antivirus scanC. The technician did not install a second antivirus suite to complement the first suiteD. The technician did not put the computer back onto the network

A. The technician did not disable the System Restore utility

When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue?A. Disk ManagementB. Secure BootC. System RestoreD. msconfigE. fixboot

The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in this scenario?A. Cable locksB. Biometric securityC. Data encryptionD. Login time restrictionE. LoJack

In Windows 8.1, \\E$ is an example of which of the following types of share?A. EFSB. AdministrativeC. LocalD. NAS

A home server rack is being installed in the computer room and is outfitted with a power distribution block. Which of the following safety precautions is required?A. Cable managementB. Electrostatic discharge matC. Equipment groundingD. Uninterruptible power supply

When working on a system, Joe, a technician, needs to prevent computer component failure by following a few simple rules. Joe is handling internal components but is not using an ESD strap. After opening the computer, which of the following should Joe do NEXT?A. Remove dust from the systemB. Ground himself to the chassisC. Unplug the power cableD. Use an antistatic bag

B. Ground himself to the chassis

A user has reported that when a document is being edited a pop-up appears and locks the workstation. The pop-up states that federal authorities have detected illegal copyrighted material on the workstation. The technician removes the malware and creates a restore point. Which of the following should the technician perform NEXT before closing the report?A. Contact the local computer emergency response teamB. Quarantine the workstation for possible infectionsC. Train the user on safe Internet browsingD. Restore to an earlier state and disable System Restore

C. Train the user on safe Internet browsing

A technician is configuring settings on a Windows PC and wants to temporarily disable the UAC prompt. Which of the following Control Panel options would allow the technician to accomplish this task?A. Windows FirewallB. User AccountsC. Administrative ToolsD. Parental Controls

A technician has a single computer that continually shuts down every evening for no apparent reason and must be turned on each day. The technician has verified hibernate and sleep settings do not exist on the computer and the computer power is not the problem. Which of the following would the technician use to troubleshoot the root cause of the random shut downs? (Choose two.)A. System RestoreB. Event ViewerC. Safe modeD. System file checkerE. LogsF. MSConfig

A technician wants to secure a company’s laptops by preventing the USB flash drive from being used. Which of the following would be the BEST and FASTEST way for the technician to accomplish this goal?A. Use intrusion prevention systemsB. Disable physical portsC. Uninstall USB driversD. Install HIDS

B. Disable physical ports

A technician for a large accounting firm is in the process of delivering all assets for retired equipment to a third-party vendor. The equipment contains printers, laptops, desktops, and hard drives. Which of the following should the technician receive from the thirdparty vendor for audit and compliance purposes?A. Sensitive and proprietary dataB. Certificate of destructionC. Equipment security logsD. Incident reports

B. Certificate of destruction

After completing a fresh Windows 7 installation for a customer, a technician wants to ensure the OS files are hidden and protected from accidental deletion or alteration. Which of the following locations should the technician view to make this change?A. Control Panel – folder optionsB. Insert Windows disc – i386 folderC. Start menu – run – REGEDITD. Right-click desktop – view

A. Control Panel – folder options

A mobile device user is concerned about security. The user wants to use multifactor authentication on the device. Which of the following would BEST accomplish this?A. Passcode lock and swipe lockB. Fingerprint lock and passcode lockC. Picture passcode and pin lockD. Face lock and fingerprint lock

B. Fingerprint lock and passcode lock

A SOHO user calls a technician and reports that after an on-site technician replaced all of the ink cartridges in a printer, characters are not printing clearly. Which of the following is the BEST course of action for the technician to take NEXT?A. Reinstall the printer driversB. Train the user on how to calibrate the printerC. Suggest the user replace the ink cartridgesD. Recommend replacing the printer

B. Train the user on how to calibrate the printer

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?A. Change the browser’s home pageB. Check the Windows host fileC. Update the default web browserD. Restore Windows to a previous date

B. Check the Windows host file

A technician has received new computers to upgrade the marketing department on a large company. The old computers are to be refreshed and donated as part of company policy. Data contained on the drives needs to be inaccessible prior to donation. Which of the following methods BEST achieves this goal?A. Single drive wipeB. DegaussingC. Low-level formatD. Multipass overwrite

A security administrator is developing workstation hardening standards. As part of the baseline, the administrator recommends implementing controls to mitigate risks associated with dictionary attacks. Which of the following would BEST meet the requirements of the administrator?A. Account lockoutB. Login time restrictionsC. Mobile tokenizationD. Full-disk encryption

Which of the following BEST describes kernel panic?A. An OS feature that provides an administrator with the ability to override the boot sequence if fault detection has occurredB. An OS call that results from rootkit malware being detected and the system rebooting in safe modeC. A low-level OS function that handles any fatal errors by sending an image of the system’s memory to diskD. A condition in the OS where low-level system calls are preempted by lower priority services, resulting in an unstable operating environment

C. A low-level OS function that handles any fatal errors by sending an image of the system’s memory to disk

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?A. Air filtersB. Privacy screensC. VacuumsD. ESD mats

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?A. SystemB. DisplayC. Folder OptionsD. Indexing Options

A technician is upgrading the memory on a laptop in the field. The technician has misplaced the ESD strap. Which of the following should the technician do?A. Return to the shop and obtain a replacement strapB. Conduct the upgrade using ESD bags as mittsC. Employ effective self-grounding techniquesD. Improvise an ESD strap with a length of copper wire

C. Employ effective self-grounding techniques

Which of the following security features is ONLY available in the Windows 7 Enterprise?A. Windows FirewallB. FTP connectivityC. BitLockerD. SSL encryption

A SOHO customer has recently experienced a major hurricane. The customer had no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.)A. Backup testingB. Cloud storageC. Local storage backupsD. Data recoveryE. Hot siteF. Waterproof devices

B. Cloud storageE. Hot site

Which of the following Windows Enterprise OS versions offers BitLocker as a feature that can be enabled?A. Windows 7B. Windows 8C. Windows 8.1D. Windows 10

A technician is running a Windows Update on a Windows 7 PC. The process usually takes a few minutes before reporting if there are updates, but this time it has taken 30 minutes with no change. Which of the following should the technician do?A. Use the Microsoft Windows Update TroubleshooterB. Delete all of the files and folders in the Software Distribution folderC. Reboot to safe mode and run Windows UpdateD. Run the System Update Readiness Tool

A. Use the Microsoft Windows Update Troubleshooter

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following Oss should the technician recommend to ensure the BEST performance on this computer?A. Windows 7B. Windows 8C. Windows 8.1D. Windows 10

technician arrives on site to find that two users who have the same model of smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do NEXT?A. Reinstall the applicationB. Roll back the application to the earlier versionC. Clear the application cacheD. Update the OS of the smartphones

D. Update the OS of the smartphones

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely?A. DegaussingB. Standard formatC. OverwriteD. Low-level format

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?A. GuestB. AdministratorC. Power UserD. Remote Desktop User

A technician wants to set up a virtual machine in a public cloud environment. Which of the following cloud models should the technician use?A. IaaSB. SaaSC. PaaSD. DBaaS

When synchronizing a cell phone to an Exchange Email Server, which of the following are MOST likely to be synchronized? (Choose two.)A. PhotosB. PasswordsC. BookmarksD. NotesE. MusicF. Calendar

Which of the following are only available in Windows Professional versions but not Windows Standard versions? (Choose two.)A. Remote DesktopB. Join a domainC. Secure network connectionsD. Remote access capabilityE. Encryption file serviceF. Group Policy Editor

A. Remote DesktopF. Group Policy Editor

A user needs to replace an open-source software package with a commercially licensed package. The user has requested support to complete this task. Which of the following tools would BEST assist with this task?A. ProgramsB. RegeditC. Task ManagerD. MSConfig

A domain user logs into a computer and notices there are no mapped network drives connected. The network drives are managed by Group Policy. A technician is dispatched to troubleshoot. Which of the following command-line tools should the technician use to troubleshoot the issue?A. gpresultB. nslookupC. net useD. tracert

A systems administrator wants to take advantage of the benefits of the major cloud providers while retaining some data and services in the local datacenter. Which of the following types of cloud model should the administrator consider?A. PublicB. PrivateC. HybridD. Community

A technician notices a PC displays a missing DLL error message every time on start up. Which of the following tools should the technician use to find out which application is responsible for the error message?A. msinfo32.exeB. System Recovery OptionsC. Event ViewerD. Programs and Features

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms returned. Which of the following should the technician have covered previously as part of the original repair?A. End-user educationB. Pre-installation environment cleaningC. Disabling of System RestoreD. Infected system quarantine

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users’ mobile devices? (Choose two.)A. Full device encryptionB. Remote backup applicationC. SSO authenticationD. Device profiles updateE. OS security updatesF. Biometric authentication

E. OS security updatesF. Biometric authentication

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?A. Identify symptoms, quarantine infected system, and create restore point.B. Quarantine infected system, identify symptoms, and create restore point.C. Identify symptoms, educate end user, and create restore point.D. Create restore point, identify symptoms, and quarantine infected system.

A. Identify symptoms, quarantine infected system, and create restore point.

Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively?A. Microsoft Virtual PCB. Compatibility modeC. Hyper-VD. Virtual XP mode

An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services. Which of the following client-side boot methods initiates the deployment of the new image?A. USB flash driveB. CD-ROMC. PXED. GRUB

Which of the following would a technician use to search for a specific string within a file name?A. grepB. chmodC. wgetD. sudo

Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies?A. USB authentication tokenB. Filesystem access controlsC. Trusted platform moduleD. Fingerprint reader

C. Trusted platform module

A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue?A. Unsupported operating systemB. Unacceptable CPU type and speedC. Insufficient airflow and coolingD. Inadequate video RAM amount

C. Insufficient airflow and cooling

An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause?A. A valid certificate suitable for S/MIME is not installed.B. Emails received by the user lack suitable digital signatures.C. SSL/TLS certificates stored on the device are expired.D. The sender did not have the addressee’s public certificate.

A. A valid certificate suitable for S/MIME is not installed.

An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue?A. System RestoreB. Computer ManagementC. Disk ManagementD. System Configuration