PQ22
PQ22
PQ22
PQ22
PQ22
100

A user clicked on a link in an email and was redirected to a web page. Now, some commonly used websites are not accessible. A technician confirms that other users are not experiencing the same issue. Which of the following steps should the technician take next to properly identify the issue?

Check the hosts file.

100

A user's File Explorer keeps crashing. The technician is troubleshooting and tries the following:

• Runs Windows Update

• Runs CHKDSK and SFC /scannow

• Clears File Explorer history

Which of the following actions should the technician take next?

Test the computer's memory.

100

A technician is adding some Windows 10 workstations to the corporate domain. A script was able to add the majority of the workstations, but failed on a couple. Which of the following menus should the technician check in order to complete the task manually?

System Properties

100

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

BitLocker

100

Which of the following is protected by government policy for end user information?

PII

200

A technician is installing a new copy of Windows on all computers in the enterprise. Given the following requirements: 

• The install phase must be scripted to run over the network. 

• Each computer requires a new SSD as the system drive.

• The existing HDD should remain as a backup drive

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share?(Choose three.)

net use, robocopy, diskpart

200

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Upgrading the current mesh network to support the 802.11n specification

200

A technician is troubleshooting a user's PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window. Which of the following is the most likely cause of these issues?

False alert

200

Employees at comptia.org are reporting getting a usual amount of emails from a coworker. A technician discovers the emails were sent from the following address: john@cOmptia.org. Which of the following social engineering attacks is this an example of?

Phishing

200

Which of the following allows users to access connected system features through account federation?

SSO

300

A newly hired employee is trying to enroll a personal mobile device in the company's mobile device management system. After the initial attempt, the employee receives a notification stating, "not compliant - call support.' Which of the following is the reason why the employee is receiving this message?

The device has been jailbroken.

300

A customer needs to verify an executable file that the customer downloaded from a website. Which of the following should the customer use to verify the file?

Checksum

300

A customer called the help desk to report that a new USB CD drive is not working. Which of the following tools should the technician use to diagnose the issue?

devmgmt.msc

300

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Quality of service

300

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Investigate the firewall logs.

400

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

Group Policy

400

A technician needs to implement a backup and recovery solution that will ensure executives’ laptops can be restored if needed. The plan should include the capability to perform granular and whole-disk recovery. Which of the following are the best options for the technician to successfully implement the plan? (Choose two.)

Incremental backup, Disk imaging

400

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

Authenticator application

400

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

Static IP

400

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following the most effective way to prevent this issue from reoccurring?

Spam filtering

500

A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?

Automate the patching process

500

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Configure MAC filtering.

500

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

Perform a full-system, antivirus scan and check browser notifications.

500

A web server is configured to only allow secure connections. Which of the following will a user most likely use to connect to the web server?

TLS

500

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

Remote wipe