Q1. A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user’s NEXT step in resolving this issue?
A. Configure Wake-on-LAN for the NIC on the Work PC.
B. Configure a firewall exception on the Home PC.
C. Switch the Work PC network from “Work” to “Home”.
D. Disable the Windows firewall on the Home PC.
Answer: B
Q2. An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies?
A. DRM
B. EULA
C. IRP
D. PII
Answer: D
Q3. A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this?
A. BitLocker To Go
B. Set strong passwords
C. Disable usermin
D. Disable AutoRun
Answer: D
Q4. A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
A. Shoulder surfing
B. Phishing attack
C. Social engineering
D. Malware infection
Answer: C
Q5. A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?
A. Fusing
B. Paper handling
C. Transfer
D. Development
Answer: D
Q6. Which of the following tools is used to type or paste recovery commands directly into a Linux box?
A. Shell/terminal
B. Backup/time machine
C. Command/cmd
D. Restore/snapshot
Answer: A
Q7. A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?
A. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.
B. Install a USB wireless card to ensure that Windows networking is working properly.
C. Open the laptop and reseat the network card and both antennas.
D. Download and install the latest wireless driver from the manufacturer’s website.
Answer: A
Q8. A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?
A. Secure the workstation in a limited access facility.
B. Document the incident, purge all policy violating materials.
C. Immediately delete all unauthorized materials.
D. Reprimand the user and apply a content filter to their profile.
Answer: A
Q9. A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?
A. Display -> Settings -> Advanced -> General -> DPI
B. Display -> Settings -> Resolution
C. Display -> Settings -> Advanced -> Adapter -> Refresh
D. Display -> Appearance -> Effects -> Transition
Answer: C
Q10. A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST?
A. PXE
B. WOL
C. WiFi
D. UPNP
Answer: A
Q11. A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO).
A. Install more physical memory.
B. Increase the size of the virtual hard drive.
C. Install a different hypervisor.
D. Reduce physical memory allocated to the VM.
E. Clear temporary files in the VM.
F. Install additional physical hard drives.
Answer: A,D
Q12. Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a work PC?
A. Transfer data via WiFi Direct to the user’s laptop.
B. Use Bluetooth to share data from the phone.
C. Connect the iPhone’s USB cable and use iTunes.
D. Copy the data from the phone to a MicroSD card.
Answer: C
Q13. A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?
A. Identify the problem
B. Establish a plan of action to resolve the problem
C. Test the theory to determine cause
D. Document findings, actions, and outcomes
Answer: D
Q14. A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?
A. Reset to the smartphone to factory default.
B. Uninstall any unused apps.
C. Close all running apps.
D. Charge the smartphone.
Answer: C
Q15. Which of the following identifies traffic based upon its physical network address?
A. Phishing
B. Hashing
C. MAC filtering
D. Geotracking
Answer: C