PQ13
PQ13
PQ13
PQ13
PQ13
100

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Educate the end user

100

Which of the following protects a mobile device against unwanted access when it is left unattended?

PIN code

100

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

Soft token

100

Which of the following best describes when to use the YUM command in Linux?

To add functionality

100

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

RDP

200

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company’s risk to avoid any issues. Which of the following items should the technician implement?

Anti-phishing training

200

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

Roll back the updates

200

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

Verifying warranty status with the vendor

200

Which of the following would MOST likely be used to extend the life of a device?

Proper ventilation

200

An engineer is conguring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?

Remote network installation

300

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

Personalization

300

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use for wide-scale deployment?

PXE boot

300

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user most likely be able to make this change?

System

300

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

Recovery key

300

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Choose two.)

Zombies, Botnet

400

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Choose two.)

Windows Backup and Restore, Windows Defender

400

A Windows user recently replaced a computer. The user can access the public internet on the computer; however, an internal site at https://companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

Firewall settings

400

A systems administrator is conguring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

Group Policy

400

Which of the following allows access to the command line in macOS?

Terminal

400

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

Disk Defragment

500

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

Resource Monitor

500

Which of the following refers to the steps to be taken if an issue occurs during a change implementation?

Rollback

500

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

Disk Management

500

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Quarantine the computer

500

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the technician perform to fix the issue?

Roll back updates

M
e
n
u