PQ9
PQ9
PQ9
PQ9
PQ9
100

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

ifcong

100

Which of the following should be used to secure a device from known exploits?

Operating system updates

100

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

DNS servers

100

A technician receives a call from a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

VNC

100

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Samba

200

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

Vishing

200

A technician is securing a new Windows 10 workstation and wants to enable a screensaver lock. Which of the following options in the Windows settings should the technician use?

Personalization

200

A technician is troubleshooting a mobile device that was dropped. The technician nds that the screen fails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

Accelerometer

200

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Programs and Features

200

A technician is setting up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Unattended installation

300

A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

netstat

300

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to nd the cause of the leaked data?

Uninstall the unapproved application.

300

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

Check corporate polices for guidance.

300

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

The Windows 10 desktop has Windows 10 Home installed

300

A network technician installed a SOHO router for a home oce user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat?

Change the default credentials

400

Which of the following operating systems is considered closed source?

OSX

400

A technician is creating a full inventory of the company’s IT hardware. Which of the following should the technician use for documentation management?

Asset tags and IDs

400

Which of the following macOS features provides the user with a high-level view of all open windows?

Mission Control

400

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

AUP

400

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Using a PIN and providing it to employees

500

An internet café has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician nds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

A cryptominer is verifying transactions.

500

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and les are either added or deleted regularly. Which of the following utilities can be used to mirror the source data for the backup?

robocopy

500

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

VPN

500

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specic managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

RADIUS

500

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?

Shredding

M
e
n
u