PQ2
PQ2
PQ2
PQ2
PQ2
100

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Differential

100

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process
credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Disk encryption

100

Which of the following could be used to implement secure physical access to a data center?

Badge reader

100

A technician is unable to join a Windows 10 laptop to a domain. Which of the following is the MOST likely reason?

The laptop has Windows 10 Home installed.

100

The network was breached over the weekend. System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Account lockout

200

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions

200

A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)

Deploy an ad-blocking extension to the browser.
Perform a reset on the user's web browser.

200

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.)

Enable multifactor authentication for each support account.
Enforce account lockouts after five bad password attempts.

200

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use, browser-based interface?

Chrome OS

200

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

dfrgui.exe

300

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

robocopy

300

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

.app

300

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Resource Monitor

300

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined
to a domain. Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign-in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

300

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Degaussing

400

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Full

400

A technician is investigating an employee's smartphone that has the following symptoms:
✑ The device is hot, even when it is not in use.
✑ Applications crash, especially when others are launched.
✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.
Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)

Turn on autorotation.
Close unnecessary applications.

400

Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90c8ee97fa7c211b7673a8
Which of the following BEST describes the purpose of this string?

Hash verification

400

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Network utilization will be significantly increased due to the size of CAD files.

400

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

Pro

500

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Firewall

500

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

Run both CPU and memory tests to ensure that all hardware functionality is normal.

500

A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

Prevent a device root.
Block a third-party application installation.

500

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Vishing

500

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

File Explorer

M
e
n
u