Q1. A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?
A. DHCP server
B. DNS server
C. File server
D. Proxy server
Answer: A
Q2. Which of the following commands are used from a Linux command line interface to elevate a user’s access level to administrative privilege? (Select TWO).
A. chmod
B. passwd
C. sudo
D. su
E. runas
F. pwd
Answer: C,D
Q3. After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?
A. Replace the RAID controller and boot.
B. Reinsert the drive and boot.
C. Plug the drive back in, the system will resume automatically.
D. Remove all drives and rebuild the array.
Answer: B
Q4. When securing a mobile device, which of the following types of screen locks is the MOST secure?
A. Fingerprint lock
B. Swipe lock
C. Passcode lock
D. Face lock
Answer: A
Q5. Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).
A. Use multi-factor authentication
B. Require strong passwords
C. Enable file encryption
D. Educate end users
E. Restrict user permissions
Answer: A,D
Q6. A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an “Access denied” error message. Which of the following is MOST likely the cause of the error?
A. The server is no longer accepting connections since reaching its limit of open shares.
B. The password is incorrect, requiring the user to reset it before authentication will proceed.
C. The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).
D. The account does not have local administrative permissions to access the server share.
Answer: D
Q7. Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?
A. Backup
B. Recovery Image
C. chkdsk
D. System Restore
Answer: D
Q8. Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).
A. Change the SSID to a different broadcast name
B. Add the intruding device to a blocked access list
C. Access the intruder’s device and shut it down
D. Shut down the device until the intruder is no longer in the area
E. Set up a WiFi analyzer to identify the intruding device
Answer: A,B
Q9. A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?
A. Enable MAC filtering
B. Disable SSID broadcast
C. Reduce radio power level
D. Update router firmware
Answer: A