PQ7
PQ7
PQ7
PQ7
PQ7
100

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Power off the machine.

100

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Shredding

100

A user receives a notication indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

The GPS application contains malware.

100

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Mission Control

100

A small business owner wants to install newly purchased software on all networked PCs. The network is not congured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST ecient way for the owner to install the application?

Use a network share to share the installation les.

200

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received: The Audio Driver is not running. Which of the following will MOST likely resolve the issue?

services.msc

200

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician conrm NEXT as part of the troubleshooting process?

If NFC is enabled

200

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Chain of custody

200

A user lost a company tablet that was used for customer intake at a doctor's oce. Which of the following actions would BEST protect against unauthorized access of the data?

Performing a remote wipe on the device

200

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

Open Settings, select System, select Display, and change the Scale and layout setting to a higher percentage

300

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

System

300

A Chief Executive Ocer has learned that an exploit has been identied on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

Zero day

300

A malicious le was executed automatically when a ash drive was plugged in. Which of the following features would prevent this type of incident?

Turning off AutoPlay

300

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Choose two.)

Device drivers, Installed application license keys

300

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Choose two.)

ipcong /all, hostname

400

A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privilege environment. The user will need to access advanced features and conguration settings for several applications. Which of the following BEST describes the account access level the user will need?

Power user account

400

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Use the application at home and contact the vendor regarding a corporate license.

400

Which of the following is used to identify potential issues with a proposed change prior to implementation?

Sandbox testing

400

A technician installed an application on a user's desktop and received an error message. Which of the following tools can the technician use to research the error?

Event Viewer > Windows Logs > Application

400

Which of the following is a data security standard for protecting credit cards?

PCI

500

A technician downloads a validated security tool and notes the vendor hash of a11e11a1. When the download is complete, the technician again validates the hash, but the value returns as 2a222a2b2. Which of the following is the MOST likely cause of the issue?

Modfied file

500

A technician needs to interconnect two oces to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

VPN

500

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

500

A technician is conguring a new Windows laptop. Corporate policy requires that mobile devices make use of full disk encryption at all times. Which of the following encryption solutions should the technician choose?

BitLocker

500

A technician has veried that a user's computer has a virus, and the antivirus software is out of date. Which of the following steps should the technician take NEXT?

Quarantine the computer.

M
e
n
u