Yahir, a user, has purchased a new Android phone and is attempting to access a public hotspot. When he opens a browser, he gets a message indicating the page cannot be displayed. He notices there is a "?" in the radio icon in the toolbar. He has verified Bluetooth is active, airplane mode is off, and tethering is turned on. He uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Yahir is experiencing?
There is unauthenticated wireless connectivity
He has exceeded the data allowance
The phone is only 3G capable
It is an unrooted phone
There is unauthenticated wireless connectivity
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?
Inform management regarding the anticipated amount of downtime
Document a backout plan to roll back changes to the router
Configure a redundant data path to eliminate downtime
Make the downtime window larger than actually anticipated
Document a backout plan to roll back changes to the router
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business?
Default SSID
MAC filtering
Signal strength
Encryption
MAC filtering
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?
Drill
Hammer
Low-level format
Degaussing
Degaussing
A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?
Reboot into safe mode
Check the boot order
Format the drive
Perform Windows Recovery
Check the boot order
A junior Linux systems administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
sudo
chmod
grep
pwd
sudo
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?
Delete the user accounts
Disable the user accounts
Restrict the user accounts
Reset the user accounts
Disable the user accounts
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?
Unattended installation
Refresh upgrade
Clean installation
In-place upgrade
Refresh upgrade
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?
Implementing strong passwords
Changing default credentials
Disabling AutoRun
Removing Guest account
Disabling AutoRun
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds?
Joe's data transmission is over the limit
The phone needs to be rebooted from overuse
The use of GPS interferes with data speeds
There is unintended Bluetooth pairing
Joe's data transmission is over the limit
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
Default SSID
MAC filtering
Power levels
Content filtering
Power levels
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network?
Reduce the transmit power
Reduce the channel availably
Disable the DHCP server
Enable QoS management
Reduce the transmit power
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
Files disappearing
File permission changes
Application crash
Too many startup items
Too many startup items
A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection?
Connect to the network and update the OS with the latest security patches
Scan and clean the USB device used to transfer data from the equipment
Disable System restore and remove all restore points from the system
Update the local antivirus and set it to scan automatically every evening
Update the local antivirus and set it to scan automatically every evening
You’re managing the cables for a network rack in a data center. What should you do after adding a new cable segment to your network?
A.Create a report and submit it to the network administrator.
B.Update the wiring schematics.
C.Create a new wiring diagram.
D.Send a picture of the new wire to the network administrator.
B.Update the wiring schematics.
A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?
Guest
Power User
Administrator
Standard User
Guest
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?
Air filters
Privacy screens
Vacuums
ESD mats
Air filters
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?
Biometric device
Common access card
Cable lock
Privacy screen
Privacy screen
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
WPA2
AES
MAC filtering
RADIUS
RADIUS
Which of the following characterizes a central wiring hub, commonly located in a closet, where the horizontal cabling connects with the network backbone?
A.MDF
B.MTBF
C.IDF
D.SLA
A.MDF
A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?
SSD
Optical drive
Flash drive
PXE
PXE
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
Use an antivirus product capable of performing heuristic analysis
Use a host-based intrusion detection system on each computer
Disallow the password caching of accounts in the administrators group
Install a UTM in between PC endpoints to monitor for suspicious traffic
Use an antivirus product capable of performing heuristic analysis
Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
Use full device encryption
Enable a pattern lock
Implement remote wipe features
Use device lockout policies
Use full device encryption
Implement remote wipe features
A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?
Resolution
Refresh rate
Extended monitor
Color depth
Resolution
Which of the following wireless LAN security protocols does NOT support using a pre-shared key (PSK) in its Personal configuration?
A.WEP
B.WPA
C.WPA2
D.WPA3
D.WPA3