PQ16
PQ16
PQ16
PQ16
PQ16
100

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Creating a database

100

Which of the following filesystem types does macOS use?

APFS

100

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

UEFI password

100

A technician receives a personal text message while troubleshooting a customer's PC. The technician does not reply to the message and continues troubleshooting. Which of the following best describes the technician's actions?

Avoiding distractions

100

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

Primary account and password

200

Which of the following types of malicious software is most likely to demand payments in cryptocurrency?

Ransomware

200

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Choose two.)

Restricting log-in times, Enabling a screen lock

200

Which of the following involves sending arbitrary characters in a web page request?

XSS

200

A new employee is having diculties using a laptop with a docking station. The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the issue?

Choose what closing the lid does

200

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

Restore the defaults and reimage the corporate OS

300

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator most likely creating?

Acceptable use policy

300

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

chmod

300

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

Reinstall and update the failing software.

300

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Verify the DNS server settings

300

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

RMM

400

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

.bat

400

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

Graphics card

400

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

SSID

400

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?

Power Options

400

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

Reinstall the operating system.

500

Which of the following macOS features can help a user dose an application that has stopped responding?

Force Quit

500

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed: crypt32.dll is missing or not found Which of the following should the technician attempt first?

Perform a system file check

500

A customer is accessing a public kiosk in a company’s lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?

Private-browsing mode

500

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

Requiring all network changes include updating the network diagrams

500

A salesperson's computer is unable to print any orders on a local printer that is connected to the computer. Which of the following tools should the salesperson use to restart the print spooler?

Services

M
e
n
u