Hardwareish
Organizational Stuff
System Config
Trouble
Security
100

A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST?

❍ A. Equipment grounding

❍ B. Air filtration

❍ C. Cable management

❍ D. Waste disposal regulations

The Answer: A. Equipment grounding

Electrical safety is one of the highest priorities because of its association

with personal safety. Before a single computer can be turned on, the facility

has to be properly grounded

100

Which of these Windows features provides full disk encryption for all

data on a storage drive?

❍ A. Domain Services

❍ B. EFS

❍ C. RDP

❍ D. BitLocker

D Bitlocker

100

A system administrator is troubleshooting an older application on a

Windows 10 computer and needs to modify the UAC process. Which of

the following options would provide access to these settings?

❍ A. Device Manager

❍ B. System Information

❍ C. Event Viewer

❍ D. User Accounts

D User Accounts

100

Daniel, a user, is attempting to start an application on his laptop

computer. Each time the application shows the starting graphic, it

suddenly disappears and the application icon disappears from the taskbar.

A technician would like to get more information about each previous

occurrence of the application crash. Which of these choices would

provide these details?

❍ A. Event Viewer

❍ B. Task Manager

❍ C. Startup Repair

❍ D. Safe Mode

A Event Viewer

100

A security guard has reported a person was seen passing through a secure

door without using a door badge. The intruder slipped through the door

by closely following the person in front of them. Which of these would

best describe these actions?

❍ A. Dumpster diving

❍ B. Brute force

❍ C. Phishing

❍ D. Tailgating

D Tailgate


200

An office power system occasionally experiences minor voltage spikes

during the business day. Which of the following would be the BEST way

to address this power issue?

❍ A. Power down when not actively working

❍ B. Confirm that the building has an electrical ground

❍ C. Connect a surge suppressor to each system

❍ D. Maintain an inventory of replacement power supplies

C Surge suppressor

200

A company maintains data retention requirements of five years for all

customer names, addresses, and phone numbers. Which of the following

would BEST describe this data?

❍ A. Credit card transactions

❍ B. Government-issued information

❍ C. PII

❍ D. Healthcare data

 C PII

200

A system administrator has created a shared folder on a server to

store operating system images. Technicians access the shared folder

to download the latest images when performing large-scale system

installations. Which of the following will be the MOST likely method of

accessing this data?

❍ A. Map the shared folder to an available drive letter

❍ B. Download the shared folder through a proxy

❍ C. Link the images to a cloud storage service

❍ D. Access the folder using a remote access client

A Map it

200

An attacker is using every combination of letters, numbers, and special

characters in an attempt to discover a user's password. Which of the

following would describe this attack type?

❍ A. Spoofing

❍ B. Social engineering

❍ C. Brute force attack

❍ D. DDoS

C Brute Force

200

An internal audit has found that a server in the DMZ appears to be

infected with malware. The malware does not appear to be part of a file in

the OS, and the malware is started each time system is started. What type

of malware would be MOST likely found on this server?

❍ A. Trojan

❍ B. Ransomware

❍ C. Keylogger

❍ D. Spyware

❍ E. Boot sector virus

E Boot Sector

300

When connecting a new USB webcam to Windows 10, a message

appears stating "The controller does not have enough resources for

this device." Which of the following would be the BEST next

troubleshooting step?

❍ A. Close all large-memory processes

❍ B. Modify the BCD

❍ C. Move the webcam to a different USB interface

❍ D. Use System Restore to rollback to a previous configuration

C Move it

300

A user in the accounting department would like to ensure that their

mobile device data is always available. If the user's smartphone is

damaged or stolen, they would like to replace the device and restore all

data as quickly as possible. Which of the following would provide

this functionality?

❍ A. Full device encryption

❍ B. Remote backup

❍ C. IoT isolation

❍ D. Remote wipe

B Remote Backup

300

A user on the headquarters network has opened a help desk ticket about

their Windows desktop. When starting their computer, the login process

proceeds normally but the Windows desktop takes fifteen minutes to

appear. Yesterday, the desktop would appear in just a few seconds. Which

of the following would be the MOST likely reason for this issue?

❍ A. Slow profile load

❍ B. Incorrect boot device order

❍ C. Faulty RAM

❍ D. Incorrect username and password

A Slow profile load

300

A22. A system administrator is upgrading an email service in the corporate

data center. During the upgrade, an error message appears and the

upgrade fails. Subsequent attempts to perform the upgrade also fail.

Which of the following processes should the system administrator follow

to return the email server to its previous state?

❍ A. Rollback plan

❍ B. Disaster recovery plan

❍ C. Incident response plan

❍ D. Power plan

A Rollback Plan

300

A user has been provided with a username and password to access the

corporate VPN. The user has also been provided with a hardware device

displaying a six digit code, and the code changes every 30 seconds. Which

of the following would BEST describe the use of this device?

❍ A. ACL

❍ B. Group Policy

❍ C. SMS

❍ D. Least privilege

❍ E. MFA

E MFA

400

A system administrator is configuring a server to use eight bootable

partitions on a single SSD. Which of the following partition styles would

be the BEST choice for this configuration?

❍ A. MBR

❍ B. NTFS

❍ C. diskpart

❍ D. GPT

D GPT

400

Each time a user starts a specific corporate application, a page of

disclaimers and usage requirements is shown before the login prompt.

Which of the following would BEST describe this page?

❍ A. Splash screen

❍ B. Acceptable use policy

❍ C. Standard operating procedures

❍ D. Topology diagram

A splash screen


400

A Linux administrator needs to modify the configuration text file for a

service. Which of the following utilities would provide this functionality?

❍ A. nano

❍ B. chmod

❍ C. df

❍ D. sudo

A Linux administrator needs to modify the configuration text file for a

service. Which of the following utilities would provide this functionality?

❍ A. nano

❍ B. chmod

❍ C. df

❍ D. sudo

A Nano

400

A desktop administrator is installing a 64-bit version of Windows 10

Pro on a workstation, but the installation will not start. The workstation

configuration is:

1 GHz CPU

2 GB of RAM

15 GB of free storage space

1280 x 720 video resolution

Which of the following would allow this installation to proceed?

❍ A. Increase free storage space to 32 GB

❍ B. Decrease resolution to 800 x 600

❍ C. Upgrade to a faster processor

❍ D. Increase RAM to 4 GB

A

400

A39. A technician is dismantling a test lab for a recently completed project,

and the lab manager would like to use the existing computers on a new

project. However, the security administrator would like to ensure that

none of the data from the previous project is accessible on the existing

hard drives. Which of the following would be the best way to

accomplish this?

❍ A. Quick format

❍ B. Deguass

❍ C. Regular format

❍ D. Reinstall the operating system

C Regular Format

500

A technician is installing a fresh Windows operating system on a file

server. Unfortunately, the drive controller in the system is not recognized

during the installation process. Which of the following would be the

BEST way to manage this issue?

❍ A. Load third-party drivers

❍ B. Restart the system

❍ C. Use a remote network installation

❍ D. Boot from the recovery partition

Load third party drivers

500

A system administrator needs to view a set of application log files

contained in a folder named “logs.” Which of the following commands

should be used to make this folder the current directory?

❍ A. cd logs

❍ B. mv logs

❍ C. dir logs

❍ D. md logs

A cd logs

500

A user has installed multiple applications over the last week. During the

startup process, the computer now takes over fifteen minutes to display

the Windows 10 desktop. Which of the following utilities would help the

system administrator troubleshoot this issue?

❍ A. defrag

❍ B. Performance Monitor

❍ C. Task Manager

❍ D. robocopy

Task Manager

500

A26. A security technician has identified malware running in the OS kernel.

Traditional anti-malware scans were not able to identify any problems on

the computer. Which of the following would be the BEST description of

this malware?

❍ A. Rootkit

❍ B. Worm

❍ C. Botnet

❍ D. Cryptominer

A Rootkit

500

A network administrator has configured all of their wireless access points

with WPA3 security. Which of the following technologies would be

associated with this configuration?

❍ A. RC4

❍ B. TACACS

❍ C. TKIP

❍ D. GCMP

D GCMP