1.
A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?
Correct Answer
B. VPN
Explanation
A network administrator should use a VPN (Virtual Private Network) to gain access to the secure network from an offsite location while ensuring the traffic is protected. VPN creates a secure and encrypted connection over a public network, such as the internet, allowing the administrator to access resources securely and privately. It provides authentication, confidentiality, and integrity of the data transmitted between the administrator's device and the secure network. SSH (Secure Shell) is a network protocol used for secure remote access, SFTP (Secure File Transfer Protocol) is used for secure file transfer, and RDP (Remote Desktop Protocol) is used for remote desktop access, but they do not provide the same level of security and protection as a VPN.
2.
A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options?
Correct Answer
A. Compatibility view
Explanation
The technician should change the "Compatibility view" Internet Option. Compatibility view is a feature in newer web browsers that allows the browser to display websites as if it were an older version of the browser. This is useful for viewing websites that were designed for older browsers and may not display properly in newer ones. By enabling compatibility view, the technician may be able to view the map on the navigation website correctly.
3.
A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).
Correct Answer(s)
B. Type EXIT at the command prompt and press Enter
D. Click the “x” in the top right of the CMD window
Explanation
The technician should type EXIT at the command prompt and press Enter to exit the CMD box and close the command prompt window. Additionally, the technician should click the "x" in the top right of the CMD window to close it. This ensures that the technician properly ends the session and moves on to the next user without leaving any open processes or windows.
4.
An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step?
Correct Answer
C. Open the location with administrator privileges
Explanation
The administrator should open the location with administrator privileges because the "access denied" error suggests that the user's credentials do not have sufficient permissions to map the shared network drive. By opening the location with administrator privileges, the administrator can ensure that they have the necessary permissions to access and map the drive successfully.
5.
Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?
Correct Answer
D. System Restore
Explanation
System Restore is the fastest tool for a technician to use in this situation because it allows the computer to revert back to a previous state where the documents were opening properly. This tool does not require any additional steps or processes like backing up or recovering files, or running disk checks. It simply restores the system settings and configurations to a previous working state, which should resolve the issue and allow the documents to open again.
6.
A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?
Correct Answer
A. Advanced
Explanation
The technician should look to enable the aforementioned TLS settings in the Advanced tab of the Internet Options. This tab usually contains advanced settings and options for the browser, including security settings such as TLS versions.
7.
Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?
Correct Answer
D. Proxy server
Explanation
A proxy server is designed to act as an intermediary between clients and web servers. It can cache web pages and other content, making it faster for clients to access frequently visited websites. Additionally, a proxy server can provide security by filtering and blocking certain websites or content. Therefore, a proxy server is the most likely network host to provide the services needed for client access to Internet web pages.
8.
Which of the following best practices is used to fix a zero-day vulnerability on Linux?
Correct Answer
C. Patch management
Explanation
Patch management is the best practice used to fix a zero-day vulnerability on Linux. A zero-day vulnerability refers to a security flaw that is unknown to the software vendor and has not been patched yet. Patch management involves regularly checking for and applying software updates, including security patches, to fix vulnerabilities and ensure the system is up to date. By implementing effective patch management, organizations can address zero-day vulnerabilities promptly and minimize the risk of exploitation by hackers or malicious actors.
9.
Which of the following tools is used to type or paste recovery commands directly into a Linux box?
Correct Answer
A. Shell/terminal
Explanation
The shell/terminal is used to type or paste recovery commands directly into a Linux box. It provides a command-line interface for interacting with the operating system and executing various commands. This allows users to directly input recovery commands to troubleshoot and fix issues on the Linux system.
10.
A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?
Correct Answer
C. 30 feet (9 meters)
Explanation
Bluetooth technology typically has an operating range of around 30 feet (9 meters). This means that the technician can expect the Bluetooth speakers to function properly within this range, allowing users to connect and play audio from their devices without any issues. It is important to note that the actual range may vary depending on factors such as interference, obstructions, and the specific Bluetooth device being used.
11.
A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?
Correct Answer
A. Microsoft Store
Explanation
The Microsoft Store is available for installing more applications on a Windows 8.1 RT operating system. The Microsoft Store is an online marketplace where users can download and install various applications, including both free and paid ones. It offers a wide range of software options and allows users to easily browse, search, and install applications directly onto their device.
12.
A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?
Correct Answer
A. Hybrid
Explanation
A company that manages its own cloud infrastructure but also utilizes a third-party vendor to help manage storage is implementing a hybrid infrastructure. A hybrid infrastructure combines elements of both private and public cloud environments. In this case, the company has its own private cloud for managing most of its computing resources, but it leverages a third-party vendor's public cloud storage services to offload and manage storage needs. This allows the company to have more control over its sensitive data and applications while also taking advantage of the scalability and cost-effectiveness of public cloud storage.
13.
An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?
Correct Answer
B. Virtual host network adapter
Explanation
To repair the problem of the virtual client not receiving network connectivity, the administrator would check the virtual host network adapter on the host workstation. This is because the virtual host network adapter is responsible for providing network connectivity to the virtual client. By checking the virtual host network adapter, the administrator can troubleshoot and resolve any issues that may be causing the lack of network connectivity for the virtual client.
14.
A Google account on an Android device by default will synchronize to which of the following locations?
Correct Answer
A. Cloud
Explanation
A Google account on an Android device by default will synchronize to the cloud. This means that the data and settings associated with the account, such as contacts, emails, app data, and preferences, will be stored and backed up in Google's cloud-based servers. This allows users to access their information from multiple devices and ensures that their data is safe and easily recoverable in case of device loss or damage.
15.
How would a technician install Windows OS on a MAC OS computer without using third-party software?
Correct Answer
D. Boot Camp
Explanation
Boot Camp is a built-in utility provided by Apple that allows users to install Windows OS on a Mac computer without the need for third-party software. It creates a separate partition on the Mac's hard drive, allowing the user to dual boot between macOS and Windows. This enables the technician to install Windows OS on the Mac computer directly from the Boot Camp utility, without the need for any additional software or tools.
16.
A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?
Correct Answer
C. One Drive
Explanation
One Drive would be the best option to use in order to save all attachments from an Outlook.com email to a cloud-based service. One Drive is a cloud storage service provided by Microsoft, which integrates seamlessly with Outlook.com. It allows users to easily save and access files from their email attachments in the cloud, ensuring that they are securely stored and can be accessed from any device with an internet connection.
17.
Virtual machines provide users with the ability to do which of the following?
Correct Answer
B. Share hardware resources
Explanation
Virtual machines provide users with the ability to share hardware resources. This means that multiple virtual machines can run on a single physical machine, allowing for efficient utilization of resources such as CPU, memory, and storage. By sharing resources, virtualization enables better scalability, flexibility, and cost-effectiveness in managing and deploying applications and services.
18.
Which of the following features of a mobile device operates the touch screen?
Correct Answer
B. Digitizer
Explanation
The correct answer is Digitizer. A digitizer is a hardware component that operates the touch screen of a mobile device. It is responsible for converting the user's touch into digital signals that the device can understand and respond to. The digitizer detects the position and movement of the user's finger or stylus on the screen, allowing for touch-based interactions and input. The gyroscope, accelerometer, and geotracking are other features of a mobile device that serve different purposes and are not directly involved in operating the touch screen.
19.
A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?
Correct Answer
A. DHCP server
Explanation
The technician would most likely review the DHCP server to find a list of all static IP addresses in the building. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. While it primarily assigns dynamic IP addresses, it can also be configured to assign static IP addresses. Therefore, the DHCP server would have a record of all the static IP addresses in the building.
20.
A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).
Correct Answer(s)
A. Free/busy
D. Calendar
G. Contacts
Explanation
The correct answer is Free/busy, Calendar, and Contacts. These three items can be synced to the devices via webmail. Free/busy refers to the availability status of the user, which can be synced across devices. Calendar allows the user to sync their appointments and events, ensuring they are consistent across all devices. Contacts can also be synced, ensuring that the user's contact list is the same on all devices.
21.
A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?
Correct Answer
C. The username is not part of the local administrator group
Explanation
The most likely reason the network administrator is unable to install programs on a workstation is that the username being used is not part of the local administrator group. This means that the user does not have the necessary permissions to install applications on the workstation.
22.
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
Correct Answer
B. ACL
Explanation
ACL stands for Access Control List, which is a tool used to control access to network resources. In this scenario, the technician wants to limit the users who can connect to a network printer. By implementing an ACL, the technician can specify which users or groups are allowed or denied access to the printer. This ensures that only authorized users can connect to the printer, increasing security and preventing unauthorized access. VPN (Virtual Private Network) is used to establish a secure connection over a public network, RDP (Remote Desktop Protocol) is used to remotely access and control a computer, and DLP (Data Loss Prevention) is a system used to prevent the unauthorized transmission of sensitive data.
23.
An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?
Correct Answer
C. The email filter has quarantined the messages
Explanation
The most likely cause of the end user not receiving emails from a specific customer is that the email filter has quarantined the messages. This means that the email filter has flagged the messages as potentially harmful or spam, and has therefore held them back from being delivered to the end user's inbox. This is a common practice to protect users from malicious or unwanted emails.
24.
A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?
Correct Answer
B. Verify a smart card has been issued
25.
A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
Correct Answer
C. Require laptop hard drives to be encrypted.
Explanation
The first step in implementing a best practice security policy after a lost laptop with sensitive corporate information has been published on the Internet is to require laptop hard drives to be encrypted. Encrypting the hard drives ensures that even if the laptop falls into the wrong hands, the data cannot be accessed without the encryption key. This helps to protect the sensitive information and prevent unauthorized access.
26.
The type of security threat that uses computers or other networks to accept and pass on viruses is called:
Correct Answer
B. Botnets
Explanation
Botnets are a type of security threat that uses computers or other networks to accept and pass on viruses. Botnets are networks of infected computers that are controlled by a central server or botmaster. These infected computers, also known as bots, can be used to distribute malware, launch DDoS attacks, or send out spam emails. By utilizing a network of infected computers, botnets can spread viruses and other malicious software more effectively and quickly.
27.
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?
Correct Answer
A. Trojan horse
Explanation
Joe is the victim of a Trojan horse. A Trojan horse is a type of malicious software that disguises itself as a legitimate program or file, tricking the user into downloading and installing it. Once installed, it can perform various malicious activities, such as dialing unrecognized numbers and downloading new content without the user's knowledge or consent.
28.
A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?
Correct Answer
C. EFS
Explanation
The correct answer is EFS. EFS (Encrypting File System) is a feature in NTFS (New Technology File System) that allows users to encrypt files and folders to protect sensitive data. When files are encrypted using EFS, the filenames appear in green color. Therefore, if the technician is unable to copy files with green letters in the filenames, it indicates that those files are encrypted using EFS.
29.
When securing a mobile device, which of the following types of screen locks is the MOST secure?
Correct Answer
A. Fingerprint lock
Explanation
The most secure type of screen lock for a mobile device is the fingerprint lock. This is because fingerprints are unique to each individual, making it difficult for someone else to unlock the device without the owner's fingerprint. Additionally, fingerprints are not easily replicated or guessed, providing an extra layer of security compared to other types of screen locks such as swipe, passcode, or face lock.
30.
A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?
Correct Answer
D. Drive wipe
Explanation
To securely repurpose the hard drives for later use, the technician should perform a drive wipe. This process involves completely erasing all data on the hard drives, ensuring that no sensitive information remains. Unlike a quick format or chkdsk, which only perform surface-level checks or delete file system information, a drive wipe ensures that the data cannot be recovered. Degaussing, on the other hand, is a method used for erasing data from magnetic media such as tapes or floppy disks, and is not applicable to hard drives.