A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST?
❍ A. Equipment grounding
❍ B. Air filtration
❍ C. Cable management
❍ D. Waste disposal regulations
The Answer: A. Equipment grounding
Electrical safety is one of the highest priorities because of its association
with personal safety. Before a single computer can be turned on, the facility
has to be properly grounded
Which of these Windows features provides full disk encryption for all
data on a storage drive?
❍ A. Domain Services
❍ B. EFS
❍ C. RDP
❍ D. BitLocker
D Bitlocker
A system administrator is troubleshooting an older application on a
Windows 10 computer and needs to modify the UAC process. Which of
the following options would provide access to these settings?
❍ A. Device Manager
❍ B. System Information
❍ C. Event Viewer
❍ D. User Accounts
D User Accounts
Daniel, a user, is attempting to start an application on his laptop
computer. Each time the application shows the starting graphic, it
suddenly disappears and the application icon disappears from the taskbar.
A technician would like to get more information about each previous
occurrence of the application crash. Which of these choices would
provide these details?
❍ A. Event Viewer
❍ B. Task Manager
❍ C. Startup Repair
❍ D. Safe Mode
A Event Viewer
A security guard has reported a person was seen passing through a secure
door without using a door badge. The intruder slipped through the door
by closely following the person in front of them. Which of these would
best describe these actions?
❍ A. Dumpster diving
❍ B. Brute force
❍ C. Phishing
❍ D. Tailgating
D Tailgate
An office power system occasionally experiences minor voltage spikes
during the business day. Which of the following would be the BEST way
to address this power issue?
❍ A. Power down when not actively working
❍ B. Confirm that the building has an electrical ground
❍ C. Connect a surge suppressor to each system
❍ D. Maintain an inventory of replacement power supplies
C Surge suppressor
A company maintains data retention requirements of five years for all
customer names, addresses, and phone numbers. Which of the following
would BEST describe this data?
❍ A. Credit card transactions
❍ B. Government-issued information
❍ C. PII
❍ D. Healthcare data
C PII
A system administrator has created a shared folder on a server to
store operating system images. Technicians access the shared folder
to download the latest images when performing large-scale system
installations. Which of the following will be the MOST likely method of
accessing this data?
❍ A. Map the shared folder to an available drive letter
❍ B. Download the shared folder through a proxy
❍ C. Link the images to a cloud storage service
❍ D. Access the folder using a remote access client
A Map it
An attacker is using every combination of letters, numbers, and special
characters in an attempt to discover a user's password. Which of the
following would describe this attack type?
❍ A. Spoofing
❍ B. Social engineering
❍ C. Brute force attack
❍ D. DDoS
C Brute Force
An internal audit has found that a server in the DMZ appears to be
infected with malware. The malware does not appear to be part of a file in
the OS, and the malware is started each time system is started. What type
of malware would be MOST likely found on this server?
❍ A. Trojan
❍ B. Ransomware
❍ C. Keylogger
❍ D. Spyware
❍ E. Boot sector virus
E Boot Sector
When connecting a new USB webcam to Windows 10, a message
appears stating "The controller does not have enough resources for
this device." Which of the following would be the BEST next
troubleshooting step?
❍ A. Close all large-memory processes
❍ B. Modify the BCD
❍ C. Move the webcam to a different USB interface
❍ D. Use System Restore to rollback to a previous configuration
C Move it
A user in the accounting department would like to ensure that their
mobile device data is always available. If the user's smartphone is
damaged or stolen, they would like to replace the device and restore all
data as quickly as possible. Which of the following would provide
this functionality?
❍ A. Full device encryption
❍ B. Remote backup
❍ C. IoT isolation
❍ D. Remote wipe
B Remote Backup
A user on the headquarters network has opened a help desk ticket about
their Windows desktop. When starting their computer, the login process
proceeds normally but the Windows desktop takes fifteen minutes to
appear. Yesterday, the desktop would appear in just a few seconds. Which
of the following would be the MOST likely reason for this issue?
❍ A. Slow profile load
❍ B. Incorrect boot device order
❍ C. Faulty RAM
❍ D. Incorrect username and password
A Slow profile load
A22. A system administrator is upgrading an email service in the corporate
data center. During the upgrade, an error message appears and the
upgrade fails. Subsequent attempts to perform the upgrade also fail.
Which of the following processes should the system administrator follow
to return the email server to its previous state?
❍ A. Rollback plan
❍ B. Disaster recovery plan
❍ C. Incident response plan
❍ D. Power plan
A Rollback Plan
A user has been provided with a username and password to access the
corporate VPN. The user has also been provided with a hardware device
displaying a six digit code, and the code changes every 30 seconds. Which
of the following would BEST describe the use of this device?
❍ A. ACL
❍ B. Group Policy
❍ C. SMS
❍ D. Least privilege
❍ E. MFA
E MFA
A system administrator is configuring a server to use eight bootable
partitions on a single SSD. Which of the following partition styles would
be the BEST choice for this configuration?
❍ A. MBR
❍ B. NTFS
❍ C. diskpart
❍ D. GPT
D GPT
Each time a user starts a specific corporate application, a page of
disclaimers and usage requirements is shown before the login prompt.
Which of the following would BEST describe this page?
❍ A. Splash screen
❍ B. Acceptable use policy
❍ C. Standard operating procedures
❍ D. Topology diagram
A splash screen
A Linux administrator needs to modify the configuration text file for a
service. Which of the following utilities would provide this functionality?
❍ A. nano
❍ B. chmod
❍ C. df
❍ D. sudo
A Linux administrator needs to modify the configuration text file for a
service. Which of the following utilities would provide this functionality?
❍ A. nano
❍ B. chmod
❍ C. df
❍ D. sudo
A Nano
A desktop administrator is installing a 64-bit version of Windows 10
Pro on a workstation, but the installation will not start. The workstation
configuration is:
1 GHz CPU
2 GB of RAM
15 GB of free storage space
1280 x 720 video resolution
Which of the following would allow this installation to proceed?
❍ A. Increase free storage space to 32 GB
❍ B. Decrease resolution to 800 x 600
❍ C. Upgrade to a faster processor
❍ D. Increase RAM to 4 GB
A
A39. A technician is dismantling a test lab for a recently completed project,
and the lab manager would like to use the existing computers on a new
project. However, the security administrator would like to ensure that
none of the data from the previous project is accessible on the existing
hard drives. Which of the following would be the best way to
accomplish this?
❍ A. Quick format
❍ B. Deguass
❍ C. Regular format
❍ D. Reinstall the operating system
C Regular Format
A technician is installing a fresh Windows operating system on a file
server. Unfortunately, the drive controller in the system is not recognized
during the installation process. Which of the following would be the
BEST way to manage this issue?
❍ A. Load third-party drivers
❍ B. Restart the system
❍ C. Use a remote network installation
❍ D. Boot from the recovery partition
Load third party drivers
A system administrator needs to view a set of application log files
contained in a folder named “logs.” Which of the following commands
should be used to make this folder the current directory?
❍ A. cd logs
❍ B. mv logs
❍ C. dir logs
❍ D. md logs
A cd logs
A user has installed multiple applications over the last week. During the
startup process, the computer now takes over fifteen minutes to display
the Windows 10 desktop. Which of the following utilities would help the
system administrator troubleshoot this issue?
❍ A. defrag
❍ B. Performance Monitor
❍ C. Task Manager
❍ D. robocopy
Task Manager
A26. A security technician has identified malware running in the OS kernel.
Traditional anti-malware scans were not able to identify any problems on
the computer. Which of the following would be the BEST description of
this malware?
❍ A. Rootkit
❍ B. Worm
❍ C. Botnet
❍ D. Cryptominer
A Rootkit
A network administrator has configured all of their wireless access points
with WPA3 security. Which of the following technologies would be
associated with this configuration?
❍ A. RC4
❍ B. TACACS
❍ C. TKIP
❍ D. GCMP
D GCMP