Q1. A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?
A. Phishing
B. Malware
C. Proxy redirect
D. Firmware
Answer: B
Q2. A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
A. Configure the server to use a static IP
B. Logically move the server to the DMZ
C. Reallocate the server to a different networking closet
D. Disable the remote desktop port
Answer: D
Q3. A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.
Answer: C
Q4. Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).
A. Change the SSID to a different broadcast name
B. Add the intruding device to a blocked access list
C. Access the intruder’s device and shut it down
D. Shut down the device until the intruder is no longer in the area
E. Set up a WiFi analyzer to identify the intruding device
Answer: A,B
Q5. A customer’s Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the error?
A. Action Center
B. Event Viewer
C. File Explorer
D. Disk Management
Answer: B
Q6. A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this?
A. System
B. Display
C. User Accounts
D. Folder Options
Answer: D
Q7. A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the “Prior Versions” tab. According to the theory of troubleshooting, which of the following is the technician’s NEXT step?
A. Establish a theory of probable cause
B. Establish a plan of action and implement the solution
C. Document findings, actions and outcomes
D. Verify full system functionality and implement preventive measures
Answer: A
Q8. Which of the following commands are used from a Linux command line interface to elevate a user’s access level to administrative privilege? (Select TWO).
A. chmod
B. passwd
C. sudo
D. su
E. runas
F. pwd
Answer: C,D
Q9. A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?
A. gpedit.msc
B. gpupdate
C. gpresult
D. gpmc.msc
Answer: C
Q10. A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).
A. Free/busy
B. Programs
C. Documents
D. Calendar
E. Favorites
F. Social media
G. Contacts
Answer: A,D,G
Q11. A technician is attempting to remove malware from a customer’s workstation. Which of the
following Control Panel utilities should the technician use?
A. Folder Options > View hidden files
B. System > Performance
C. Display Settings > Refresh rate
D. Internet Options > Privacy
Answer: A
Q12. Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).
A. Use multi-factor authentication
B. Require strong passwords
C. Enable file encryption
D. Educate end users
E. Restrict user permissions
Answer: A,D
Q13. A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe’s system upgrades is the cause of the problem?
A. The DVI cable is not properly seated
B. Speakers are not properly connected
C. Battery low on wireless mouse
D. Memory is mismatched
Answer: D
Q14. The customer reports their PC freezes up everyday around the same time. Which of the following utilities would be BEST to check for any error codes?
A. Windows Updates
B. Task Scheduler
C. Event Viewer
D. Performance Monitor
Answer: C
Q15. A technician is tasked with installing Windows on numerous network PCs. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?
A. Prebuilt image using PXE
B. Single solid state/flash drive with answer file
C. Hot swappable image drive
D. Internal hard drive partition with the image
Answer: A