Q1. CORRECT TEXT
The network administrator has changed the IP address of Computer A from 192. 168. 120 to 10. 10. 1020 and now Jane a user, is unable to connect to file shares on Computer A from Computers using the computer name.
Instructions:
Using the available tools, resolve the connectivity issues. When you have completed the simulation, please select the done button to submit your answer.
Answer: Please review explanation for detailed answer.
Q2. A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this?
A. Place directional antennas
B. Use omni-directional antennas
C. Enable MAC filtering
D. Disable SSID broadcast
Answer: A
Q3. An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting?
A. System Properties
B. System Information
C. System Protection
D. System Management
Answer: A
Q4. Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?
A. Anti-malware updates
B. Driver updates
C. Windows updates
D. Firmware updates
Answer: C
Q5. A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario?
A. Remote desktop
B. Remote assistance
C. telnet
D. FTP
Answer: B
Q6. Which of the following is TRUE about the difference between a worm and a virus?
A. Worms are written in assembly while viruses are written with scripting languages.
B. Viruses hide in the boot record while worms hide within the file system.
C. Worms self propagate while viruses need human intervention to replicate.
D. Viruses disable the antivirus update service while worms kill the antivirus process.
Answer: C
Q7. A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the
following email server setting types would the technician use to accomplish this task?
A. POP3
B. IMAP
C. S/MIME
D. SMTP
Answer: A
Q8. A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?
A. Automated system recovery
B. Emergency repair disks
C. FIXBOOT
D. Safe mode
Answer: D
Q9. Which of the following is an example of client-side virtualization?
A. Compatibility mode on a program icon properties menu
B. Running a DOS application on a Windows 7 32-bit operating system
C. Cloud hosted office applications
D. XP mode running in Windows 7 64-bit operating system
Answer: D
Q10. When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:
A. CMOS battery.
B. video card.
C. IDE cable.
D. floppy cable.
Answer: B
Q11. The computer starts up and runs for less than a minute before shutting down or locking up. This is a symptom of:
A. overheating.
B. incompatible RAM.
C. a faulty hard drive.
D. a bad internal USB hub.
Answer: A
Q12. A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann’s email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?
A. Social engineering
B. Phishing
C. Spear phishing
D. Hijacking
Answer: A
Q13. A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?
A. Change the router firewall settings
B. Check for and apply a firmware update
C. Reconfigure the QoS settings
D. Change router user-names and passwords
Answer: B
Q14. A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).
A. User training
B. Anti-malware
C. Paper shredding
D. Time of day restrictions
E. Employee badges
F. Mantraps
Answer: A,C
Q15. Which of the following prevention methods is considered to be digital security?
A. RFID badge
B. Mantrap
C. Biometrics
D. Firewalls
E. ID badge
Answer: D