You were troubleshooting a recently installed NIC on a workstation and decided to ping the NIC's loopback address. Which of the following IPv4 addresses should you ping?
a. 10.25.3.12
b. 172.16.1.1
c. 169.254.12.1
d. 127.0.0.1
d. 127.0.0.1
A computer is infected with malware that has infected the Windows kernel to hide. Which type of malware MOST likely infected this computer?
a. Ransomware
b. Trojan
c. Rootkit
d. DDOS
c. Rootkit
Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?
a. Reinstall Windows
b. Reboot the system into Safe Mode
c. Rebuild your Windows profile
d. Disable unnecessary programs from automatically starting up
d. Disable unnecessary programs from automatically starting up
One of your local businesses has outsourced its cloud storage services to an external provider. The IT manager needs to ensure that the provider guarantees a specific level of uptime, data availability, and support response times. If these expectations are not met, the company should have grounds for requesting service credits or other remedies. Which of the following would BEST ensure these expectations are formally defined and enforceable?
a. EULA
b. AUP
c. SLA
d. TOTP
b. AUP
Which command-line tool in Windows would you use to end one or more processes that have begun hung on the system?
a. net use
b. gpupdate
c. sfc
d. taskkill
d. taskkill
Which of the following best describes a benefit of cloud-based word processing tools?
a. Changes are only saved when the file is closed.
b. Users must download and re-upload files to make changes.
c. Documents can only be edited by one person.
d. Multiple users can edit documents simultaneously.
d. Multiple users can edit documents simultaneously.
A user's workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform?
a. Update the Windows OS
b. Perform an anti-malware scan
c. Format and reinstall the OS
d. Enable pop up blocker in the web browser
b. Perform an anti-malware scan
A customer's Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone?
a. Replace the phone with a newer model
b.Perform a hard reboot of the smartphone
c.Uninstall the app, reboot the phone, and reinstall the app
d. Factory reset the smartphone and reinstall all the apps
c.Uninstall the app, reboot the phone, and reinstall the app
Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?
a. PCI-DSS
b. PHI
c. PII
d. TPM
a. PCI-DSS
You are troubleshooting a computer that plays a loud chime noise every day at 3 pm. Which of the following tools should you use to troubleshoot this workstation?
a. Msconfig
b.Performance monitor
c.Device manager
d. Task scheduler
d. Task scheduler
A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?
a. chkdsk
b. gpupdate
c. robocopy
d. sfc
d. sfc
You're educating new staff about mobile security practices, focusing on encryption methods. Which statement accurately describes the primary purpose of device encryption?
a. It protects stored data by making it unreadable without an encryption key.
b. It restricts network access through secure passwords.
c. It prevents the installation of unauthorized software applications.
d. It verifies user identity using biometric methods.
a. It protects stored data by making it unreadable without an encryption key.
After a user authenticates to a web site, the browser performs very slowly and some of the items on the page will not properly display. Which of the following would be the best way to resolve this issue?
❍ A. Disable browser notifications
❍ B. Update the web server certificate
❍ C. Update the system BIOS
❍ D. Clear the browser cache
❍ D. Clear the browser cache
In your organization, help desk technicians use an AI-driven documentation tool to generate step-by-step troubleshooting guides for common IT issues. After implementation, users report that some of the instructions contain incorrect software commands or outdated procedures, leading to failed troubleshooting attempts. Which of the following BEST describes this issue?
a. Bias
b. Hallucination
c. Inaccuracy
d. Plagiarism
c. Inaccuracy
Which Linux command is used to print the full contents of a file to the screen at once?
a. cd
b. cat
c. mv
d. ls
cat
A customer is complaining that there are intermittent problems with their PC. As a technician, you don't know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?
a. Event viewer
b. Device manager
c. Task Scheduler
d. System information
a. Event viewer
Dion Training uses Windows 10 Pro workstations in a domain environment. The company wants to allow individual users to encrypt any files or folders they store on the local workstation's internal hard drive. Which of the following security settings can be used to encrypt this storage device?
a. BitLocker
b. FileVault
c. BitLocker to Go
d. Encrypting File System
d. Encrypting File System
A company’s shipping department maintains ten different computers for
printing shipping labels and for tracking outgoing shipments. All of the
systems are displaying an error when they access a third-party shipping
management website over a secure connection. Which of the following
would be the most likely reason for this issue?
❍ A. The computers have not been updated with the latest OS patches
❍ B. The website certificate has expired
❍ C. The local computer storage drives are not encrypted
❍ D. The systems are infected with malware
❍ B. The website certificate has expired
Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?
a. Incremental
b.Synthetic
c.Differential
d. Full
b.Synthetic
Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?
a. An in-place upgrade of the OS
b. Installing an image to the computer over the network
c. Using multiboot configuration
d. Conducting a system repair
b. Installing an image to the computer over the network
Due to a global pandemic, your company decides to implement a telework policy for its employees. Unfortunately, the company doesn't have enough time to issue laptops and smartphones to each employee. The Chief Information Officer (CIO) has decided to allow employees to use their laptops and smartphones when conducting their work from home. Which of the following policies and technology should be implemented to provide security guidance to employees on the use of these devices? (Select TWO)
a. AUP
b. MDM
c. ACL
d. COBO
e. BYOD
b. MDM
e. BYOD
A user has repeatedly gotten malware infections on their home computer after visiting untrusted websites. You've completed the malware removal process. Which is the best practice you should educate the user about to minimize the likelihood of future infections?
a. Regularly update antivirus software definitions.
b.Frequently reinstall the operating system.
c. Avoid using email attachments.
d. Use public Wi-Fi networks cautiously.
a. Regularly update antivirus software definitions.
Your Windows 10 workstation is attempting to boot up when it receives the following error, "BOOTMGR is missing; Press Ctrl+Alt+Del to restart." To fix this, you insert your Windows installation disc and reboot into the Command Prompt under the System Recovery Options. Which of the following commands should you enter in the command prompt?
a. bootrec /fixboot
b. sfc /scannow
c. ipconfig /release
d. ipconfig /flushdns
a. bootrec /fixboot
A system administrator is upgrading an email service in the corporate
data center. During the upgrade, an error message appears and the
upgrade fails. Subsequent attempts to perform the upgrade also fail.
Which of the following processes should the system administrator follow
to return the email server to its previous state?
❍ A. Rollback plan
❍ B. Disaster recovery plan
❍ C. Incident response plan
❍ D. Power plan
❍ A. Rollback plan
A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?
a. .vbs
b. .bat
c. .py
d. .js
b. .bat