Option 1
Option 2
Option 3
Option 4
Option 5
100

Yahir, a user, has purchased a new Android phone and is attempting to access a public hotspot. When he opens a browser, he gets a message indicating the page cannot be displayed. He notices there is a "?" in the radio icon in the toolbar. He has verified Bluetooth is active, airplane mode is off, and tethering is turned on. He uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Yahir is experiencing?

There is unauthenticated wireless connectivity

He has exceeded the data allowance

The phone is only 3G capable

It is an unrooted phone

There is unauthenticated wireless connectivity

100

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

Inform management regarding the anticipated amount of downtime

Document a backout plan to roll back changes to the router

Configure a redundant data path to eliminate downtime

Make the downtime window larger than actually anticipated

Document a backout plan to roll back changes to the router

100

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business?

Default SSID

MAC filtering

Signal strength

Encryption

MAC filtering

100

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?

Drill

Hammer

Low-level format

Degaussing

Degaussing

100

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?

Reboot into safe mode

Check the boot order

Format the drive

Perform Windows Recovery

Check the boot order

200

A junior Linux systems administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?


sudo

chmod

grep

pwd

sudo

200

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?


Delete the user accounts

Disable the user accounts

Restrict the user accounts

Reset the user accounts

Disable the user accounts

200

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

Unattended installation

Refresh upgrade

Clean installation

In-place upgrade

Refresh upgrade

200

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?

Implementing strong passwords

Changing default credentials

Disabling AutoRun

Removing Guest account

Disabling AutoRun

200

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds?

Joe's data transmission is over the limit

The phone needs to be rebooted from overuse

The use of GPS interferes with data speeds

There is unintended Bluetooth pairing

Joe's data transmission is over the limit

300

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

Default SSID

MAC filtering

Power levels

Content filtering

Power levels

300

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network?

Reduce the transmit power

Reduce the channel availably

Disable the DHCP server

Enable QoS management

Reduce the transmit power

300

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?

Files disappearing

File permission changes

Application crash

Too many startup items

Too many startup items

300

A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection?

Connect to the network and update the OS with the latest security patches

Scan and clean the USB device used to transfer data from the equipment

Disable System restore and remove all restore points from the system

Update the local antivirus and set it to scan automatically every evening

Update the local antivirus and set it to scan automatically every evening

300

You’re managing the cables for a network rack in a data center. What should you do after adding a new cable segment to your network?

A.Create a report and submit it to the network administrator.

B.Update the wiring schematics.

C.Create a new wiring diagram.

D.Send a picture of the new wire to the network administrator.

B.Update the wiring schematics.

400

A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?

Guest

Power User

Administrator

Standard User

Guest

400

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?


Air filters

Privacy screens

Vacuums

ESD mats

Air filters

400

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?

Biometric device

Common access card

Cable lock

Privacy screen

Privacy screen

400

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

WPA2

AES

MAC filtering

RADIUS

RADIUS

400

Which of the following characterizes a central wiring hub, commonly located in a closet, where the horizontal cabling connects with the network backbone?

A.MDF

B.MTBF

C.IDF

D.SLA

A.MDF

500

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?


SSD

Optical drive

Flash drive

PXE

PXE

500

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?


Use an antivirus product capable of performing heuristic analysis

Use a host-based intrusion detection system on each computer

Disallow the password caching of accounts in the administrators group

Install a UTM in between PC endpoints to monitor for suspicious traffic


Use an antivirus product capable of performing heuristic analysis

500

Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

Use full device encryption

Enable a pattern lock

Implement remote wipe features

Use device lockout policies

Use full device encryption

Implement remote wipe features

500

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

Resolution

Refresh rate

Extended monitor

Color depth

Resolution


500

Which of the following wireless LAN security protocols does NOT support using a pre-shared key (PSK) in its Personal configuration?

A.WEP

B.WPA

C.WPA2

D.WPA3

D.WPA3

M
e
n
u