Q1. A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO).
A. Install more physical memory.
B. Increase the size of the virtual hard drive.
C. Install a different hypervisor.
D. Reduce physical memory allocated to the VM.
E. Clear temporary files in the VM.
F. Install additional physical hard drives.
Answer: A,D
Q2. A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?
A. Advanced
B. Security
C. Privacy
D. Connections
Answer: A
Q3. An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?
A. The cable connected to the network
B. Virtual host network adapter
C. USB host adapter
D. The domain of the virtual machine
Answer: B
Q4. A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO).
A. Mask
B. ESD mat
C. ESD strap
D. Antistatic bag
E. Safety goggles
F. Rubber gloves
Answer: A,E
Q5. A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?
A. extract
B. diskpart
C. bootrec
D. chkdsk
Answer: B
Q6. A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, “The file is in use by another program.” Which of the following tools would be the BEST to use to correct the issue?
A. Terminal
B. SFC
C. Event Viewer
D. Services Console
E. Recovery Console
Answer: D
Q7. Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?
A. Time of day restrictions are enabled on the machine
B. Scheduled antivirus scans and updates are enabled on the machine
C. Remote desktop is enabled and an administrator has logged into the machine
D. Automatic Windows Update is enabled on the machine
Answer: D
Q8. Which of the following is a risk of implementing a BYOD policy?
A. Introducing malware onto the network
B. DHCP may fail due to incompatibility
C. Different encryption technology
D. Higher risk of phishing attacks
Answer: A
Q9. Which of the following security threats happens when another person enters a secured area with an authorized person?
A. Tailgating
B. Shoulder surfing
C. Spoofing
D. Phishing
Answer: A
Q10. After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
A. Run the malware removal program while disconnected from the Internet
B. Run the malware removal program in Windows Safe Mode
C. Reinstall the malware removal program from a trusted source
D. Set the malware removal program to run each time the computer is rebooted
Answer: B
Q11. A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?
A. Turning down the radio power level
B. Enabling MAC filtering
C. Setting a high encryption level
D. Disabling the SSID broadcast
Answer: B
Q12. On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
A. Content Advisor
B. Proxy Settings
C. Network Drive Mapping
D. Local Security Policy
Answer: B
Q13. DRAG DROP
Drag and drop the following Windows Versions to the correct feature on which they are found. Windows Versions may be used more than once.
Answer:
Q14. A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future?
A. Check the “Reconnect at logon” checkbox for the mapped network drive
B. Connect all computers in the office to UPS devices
C. Re-map the mapped network drive with the domain administrator account
D. Replace the hard drives on the file server hosting the shared files
Answer: A
Q15. A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
A. Reload the OS using FAT32 instead of NTFS.
B. Change the disk from basic to dynamic.
C. Run chkdsk with the /r switch and reboot the PC.
D. Open the defrag utility and run a drive analysis.
Answer: C