PQ15
PQ15
PQ15
PQ15
PQ15
100

A macOS user is installing a new application. Which of the following system directories is the software most likely to install by default?

/Applications

100

Which of the following social engineering tactics is best avoided by shredding sensitive documents?

Dumpster diving

100

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

Least privilege

100

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

pathping

100

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

RDP

200

A customer is requesting help with a technical issue. Which of the following techniques should the technician use to properly evaluate and correct the customer concern?

Use open-ended questions to get additional information.

200

A user receives an error message from an online banking site that states the following: Your connection is not private. Authority invalid. Which of the following actions should the user take next?

Report the error to the bank.

200

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

MDM

200

A user's workstation is failing to load. An analyst inspects the workstation and sees a message that states there is no bootable device. Which of the following should the analyst do first?

Verify drive readability in the BIOS.

200

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

Task Manager

300

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

Full

300

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

NTFS

300

Which of the following would allow physical access to a restricted area while maintaining a record of events?

Key fob

300

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

LAN

300

A technician receives an invalid certicate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Date and time

400

A user notices a small USB drive is attached to the user’s computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is most likely occurring?

Keylogger

400

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

User Accounts

400

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

To control evidence and maintain integrity

400

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

Local Users and Groups

400

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

Standard formatting

500

Which of the following ls command options is used to display hidden files and directories?

-a

500

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Set the connection to be metered.

500

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

Instruct the user to disconnect the Wi-Fi.

500

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Screen Sharing

500

Which of the following is used as a password manager in the macOS?

Keychain