Q1. A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following
tools would be used to troubleshoot this problem?
A. msconfig
B. appwiz.cpl
C. gpedit
D. regsrv32
Answer: A
Q2. A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use?
A. NLX
B. IDS
C. UTM
D. ATX
Answer: C
Q3. A technician gets a call from a customer stating that their computer will not boot. They are getting the following error “invalid system disk”. Which of the following should the technician check FIRST?
A. Verify the operating system is installed correctly.
B. Verify that all removable drives are empty.
C. Verify Boot.ini is on the hard drive.
D. Verify the computer will boot into safe mode.
Answer: B
Q4. Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?
A. Social engineering
B. Spoofing
C. Zero-day
D. Man-in-the-middle
Answer: A
Q5. Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain?
A. Unpaired Bluetooth
B. Weak signal
C. Defective SD card
D. Malware
Answer: B
Q6. A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?
A. Slow data speeds
B. Defective SD card
C. Unauthorized root access
D. Signal drop or weak signal
Answer: C
Q7. A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.
Answer: C
Q8. A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?
A. The PC’s Windows firewall is misconfigured
B. The PC has an incorrect IP address configured
C. The PC is on the wrong wireless network
D. The PC does not have remote assistance turned on
Answer: A
Q9. A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).
A. User training
B. Anti-malware
C. Paper shredding
D. Time of day restrictions
E. Employee badges
F. Mantraps
Answer: A,C
Q10. Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?
A. Anti-malware updates
B. Driver updates
C. Windows updates
D. Firmware updates
Answer: C
Q11. Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue?
A. Use a maintenance kit
B. Calibrate the printer
C. Replace the toner
D. Replace the fuser
Answer: A
Q12. The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this?
A. Windows Deployment Services
B. Remote Installation Services
C. System Preparation Tool
D. Unattended installation
Answer: C
Q13. A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
A. Configure the server to use a static IP
B. Logically move the server to the DMZ
C. Reallocate the server to a different networking closet
D. Disable the remote desktop port
Answer: D
Q14. A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?
A. Factory restore
B. SecureBoot
C. msconfig
D. diskpart
Answer: C
Q15. A technician is installing Windows 7 on a computer with a previously used hard drive. After receiving an error, the technician realizes the hard drive does not support this install. Which of the following tasks should the technician perform?
A. Partition the hard drive in Extended format.
B. Use Windows Update to download the appropriate driver.
C. Enable Multiboot in the BIOS.
D. Convert the file system to NTFS.
Answer: D