1.
A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?
Correct Answer
A. Reboot into safe mode and roll back the updates
Explanation
The technician should attempt to reboot the computer into safe mode and roll back the updates. This is because the black screen issue could be caused by a faulty update that was installed the previous evening. By booting into safe mode, the technician can start the computer with minimal drivers and services, allowing them to uninstall or roll back the problematic update.
2.
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
Correct Answer
A. Use an antivirus product capable of performing heuristic analysis
Explanation
Using an antivirus product capable of performing heuristic analysis would be the best solution in this scenario. Heuristic analysis allows the antivirus software to detect and identify new or unknown malware based on its behavior and characteristics, rather than relying solely on known virus signatures. This would help in preventing future malware infections, as the antivirus software would be able to detect and block any suspicious or malicious activity on the computer and prevent it from spreading to other PCs.
3.
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?
Correct Answer
B. Disable the user accounts
Explanation
Disabling the user accounts is the best way to enforce the policy mentioned in the scenario. By disabling the user accounts, the contractors will not be able to log in to the laptops after the inventory is completed, ensuring compliance with the security policy.
4.
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?
Correct Answer
B. Internet Options -> Connections
Explanation
The technician should use the "Internet Options -> Connections" utility to configure the setting. This utility allows the technician to specify the proxy server settings for the Windows workstations.
5.
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?
Correct Answer
B. Ask another technician to take the call
Explanation
The technician should ask another technician to take the call because they are scheduled to take a break just after the call comes in. This ensures that the user's issue is still addressed promptly and efficiently, without causing any inconvenience to the technician who needs to take a break.
6.
A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?
Correct Answer
B. Check the application permissions
Explanation
To determine the cause of the issue, the first step should be to check the application permissions. This is because the camera shutter noise is being made even when the user is not taking pictures, indicating that the camera application may have unauthorized access to the phone's camera. By checking the application permissions, the user can identify if the camera application has the necessary permissions to access the camera and adjust them accordingly. This step will help in understanding if the issue is related to the camera application's permissions or if there is another underlying cause.
7.
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)
Correct Answer(s)
B. Mapped drives
D. Denied write/delete permissions
Explanation
The users' inability to access certain shares on the network could be due to two main reasons. Firstly, the issue could be related to mapped drives. If the technician moved the data from one server to another, the mapped drives may still be pointing to the old server, resulting in access denial. Secondly, the problem could be caused by denied write/delete permissions. Even if the users are in the proper security groups and have the proper access, they may not have the necessary permissions to write to or delete files in the shares, leading to the access denied error.
8.
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
Correct Answer
C. Power levels
Explanation
By changing the power levels of the wireless network, the small business can limit the range of the network signal. This means that the nearby company would not be able to connect to the network without being physically close to the business premises. By reducing the power levels, the network signal will be weaker and have a shorter range, making it more difficult for unauthorized users to connect to the network from a distance. This can help address the concerns of the business owners and prevent unauthorized access to their wireless network.
9.
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?
Correct Answer
D. Set up alerts to let administrators know when backups fail
Explanation
Joe can ensure that the backups will work if needed by setting up alerts to let administrators know when backups fail. This will allow the administrators to take immediate action and resolve any issues with the backups, ensuring that they are functioning properly. This proactive approach will help to minimize the risk of data loss and ensure that the backups are reliable and effective.
10.
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?
Correct Answer
E. Remove the user-installed antivirus software
Explanation
Installing multiple real-time protection antivirus software programs can cause conflicts and slow down the performance of the laptop. Therefore, removing the user-installed antivirus software is the best solution to resolve the issue and avoid recurrence.
11.
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)
Correct Answer(s)
B. Zombies
E. Worm
Explanation
The PCs are most likely infected with Zombies and Worms. Zombies are computers that have been infected with malware and are controlled remotely by a hacker to carry out malicious activities, such as participating in a DDoS attack. Worms are self-replicating malware that spread across a network and can cause significant damage by consuming network bandwidth and resources. In this scenario, the fact that multiple internal Windows PCs are the source of the DDoS attack suggests that they have been infected with malware that allows them to be controlled as zombies and spread as worms.
12.
Emily, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Emily is experiencing?
Correct Answer
A. There is unauthenticated wireless connectivity
Explanation
Emily is experiencing unauthenticated wireless connectivity. The presence of the "?" in the radio icon suggests that the phone is connected to a Wi-Fi network, but it is not able to authenticate and access the internet. This could be due to incorrect login credentials or a network issue.
13.
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)
Correct Answer(s)
B. Chdsk
C. Dism
Explanation
The technician should use the "chdsk" command to check the integrity of the file system and correct any errors. This command scans the hard drive for errors and fixes them if possible, which can help improve the performance of the PC. Additionally, the technician should use the "dism" command to repair the Windows image and restore any corrupted system files. This command can help resolve issues that may be causing the PC to run slowly.
14.
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)
Correct Answer(s)
B. MAC filtering
E. Signal strength
Explanation
The technician should change the configuration settings of MAC filtering and signal strength to satisfy the requirements of the business. MAC filtering allows the business to create a list of approved MAC addresses, ensuring that only authorized devices can connect to the network. By enabling MAC filtering, the technician can prevent customers from connecting to the access point. Adjusting the signal strength can help limit the range of the WiFi network, ensuring that it is only accessible to employees within the business premises and not to customers outside the premises.
15.
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)
Correct Answer(s)
A. Reduce the transmit power
D. Disable the SSID broadcast
Explanation
To increase the security of the wireless network in a crowded building, the installation technician should reduce the transmit power of the wireless access point. By reducing the transmit power, the signal range will be limited to the office area, making it more difficult for unauthorized users outside the office to access the network. Additionally, the technician should disable the SSID broadcast. This will prevent the wireless network from being visible to nearby devices, making it harder for potential attackers to identify and target the network.
16.
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)
Correct Answer(s)
A. Disable guest account
C. Change default credentials
Explanation
To close the vulnerability, the security team should take two actions. First, they should disable the guest account to prevent unauthorized access. This will ensure that only authorized users can log in to the servers. Second, they should change the default credentials, as using common login information makes it easier for attackers to gain access. By changing the default credentials, the security team will strengthen the authentication process and make it more difficult for unauthorized individuals to log in.
17.
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)
Correct Answer(s)
B. WPA2
F. Multifactor
Explanation
The technician should implement WPA2 for wireless security as it provides the highest level of security among the options listed. Additionally, the technician should implement multifactor authentication to ensure various levels of desktop authentication for accessing cloud resources. This combination of WPA2 and multifactor authentication will provide the highest level of wireless security and desktop authentication for the healthcare office's SOHO wireless network.
18.
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)
Correct Answer(s)
A. UPS
B. Server rack
Explanation
UPS (Uninterruptible Power Supply) and server racks are most likely to have grounding wires attached to them based on the manufacturer's design. UPS is designed to provide backup power to critical devices and is often connected to sensitive electronic equipment, which requires grounding to protect against electrical surges and ensure proper functioning. Server racks house multiple servers and networking equipment, which generate a significant amount of heat and electrical activity. Grounding is essential to prevent electrical hazards and maintain the integrity of the equipment.
19.
Which of the following provide the BEST security for a server room? (Select two.)
Correct Answer(s)
A. Badge reader
C. Biometric lock
Explanation
Badge readers and biometric locks provide the best security for a server room. A badge reader requires authorized personnel to swipe a badge or card to gain access, ensuring only approved individuals can enter the room. Biometric locks use unique physical characteristics, such as fingerprints or iris scans, to verify the identity of individuals attempting to enter the server room. These two security measures work together to prevent unauthorized access and protect the sensitive information stored in the server room.
20.
Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)
Correct Answer(s)
C. Check all browser cached files on Ann’s laptop and log on to another vendor’s website
E. Ask Ann about the notification and review the installed programs
Explanation
Joe should first check all browser cached files on Ann's laptop and attempt to log on to another vendor's website. This will help determine if the issue is specific to the vendor's website or if it is a broader issue with the browser or cached files. Additionally, Joe should ask Ann about the notification and review the installed programs. This will provide more information about any recent changes or updates that may be causing the login issue. By taking these steps, Joe can troubleshoot the issue and identify the root cause to resolve it effectively.
21.
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
Correct Answer(s)
A. Remove applications from startup
B. Defragment the hard drive
Explanation
Removing applications from startup and defragmenting the hard drive can both help improve the boot time of an end user's PC. Removing applications from startup reduces the number of programs that need to load during startup, freeing up system resources and speeding up the boot process. Defragmenting the hard drive rearranges fragmented files, allowing them to be accessed more efficiently and reducing the time it takes for the operating system to load. These solutions are both cost-effective as they do not require any additional hardware or software purchases.
22.
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)
Correct Answer(s)
C. Put the terminal server into the router's DMZ
E. Block all unused ports on the LAN smart switch
Explanation
The administrator should put the terminal server into the router's DMZ to increase server security. Placing the server in the DMZ isolates it from the internal network, providing an additional layer of protection against unauthorized access. Additionally, the administrator should block all unused ports on the LAN smart switch to prevent potential vulnerabilities and limit access to only necessary ports, further enhancing server security.
23.
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)
Correct Answer(s)
B. Cloud storage
E. Hot site
Explanation
The contractor should recommend cloud storage as a solution to prevent data loss in the event of a disaster. Cloud storage allows data to be stored remotely on servers, ensuring that it is not affected by physical damage to the customer's premises. Additionally, the contractor should suggest implementing a hot site, which is a duplicate of the customer's infrastructure at an off-site location. This would allow the customer to quickly resume operations in the event of a disaster, as the hot site would already have the necessary hardware and data backups in place.
24.
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Correct Answer
A. Date and time
Explanation
The invalid certificate error is likely occurring because the date and time on the workstation are incorrect. Certificates have an expiration date and if the date and time on the workstation are not accurate, it can cause the certificate to appear invalid. Adjusting the date and time on the workstation should fix the issue and allow the technician to visit the website without encountering the error.
25.
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
Correct Answer
A. Fingerprint lock
Explanation
The best method of securing the phone in this scenario would be a fingerprint lock. This is because it provides an additional layer of security by requiring the user's unique fingerprint to unlock the phone. This ensures that only authorized individuals can access the customer's PII, making it more difficult for unauthorized users to gain access to the valuable data.
26.
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
Correct Answer
A. Fingerprint lock
Explanation
A fingerprint lock is the best method of securing the phone because it provides a higher level of security compared to other options. A fingerprint lock uses biometric authentication, which means that only the owner of the phone can unlock it using their unique fingerprint. This ensures that even if the phone is lost or stolen, the customer's PII remains protected. Additionally, a fingerprint lock is more convenient as it eliminates the need to remember and enter a passcode or PIN.
27.
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?
Correct Answer
A. Windows 7
Explanation
Windows 7 would be the best recommendation for this computer because it has lower system requirements compared to Windows 8, 8.1, and 10. With only 1GB of RAM and 16GB of hard drive space, the computer may struggle to meet the minimum requirements for the newer operating systems. Windows 7 is a more lightweight and optimized OS that would provide better performance on this computer.
28.
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
Correct Answer
A. SSO
Explanation
SSO, or Single Sign-On, is the best security method that allows a user to enter their username and password once and gain access to multiple applications without having to re-enter their credentials. This eliminates the need for multiple logins and enhances user convenience and productivity. SSO securely authenticates the user and propagates their permissions across different applications, providing a seamless and efficient user experience.
29.
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?
Correct Answer
A. Guest
Explanation
The technician would most likely set up a Guest account on the kiosk machine. The Guest account provides limited access to the system and restricts user privileges, ensuring security. Additionally, the Guest account does not require a password to log in, allowing for automatic login after reboot or power on. This setup would ensure that users only have access to the necessary application for customer interaction and prevent unauthorized access to the system.
30.
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?
Correct Answer
A. Open license
Explanation
An open license would be the most appropriate recommendation in this scenario. An open license allows users to freely use, modify, and distribute the software without any cost. This would meet the user's requirement of not wanting to pay for a license while still providing antivirus protection for their home PC.
31.
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?
Correct Answer
A. Task Manager
Explanation
The technician can use Task Manager to resolve the issue. Task Manager allows the technician to see the CPU utilization and the running applications. By closing some running applications, the CPU utilization drops and the laptop runs faster. Task Manager can be used to identify any resource-intensive applications or processes that may be causing the high CPU utilization, allowing the technician to address the issue and improve the laptop's performance.
32.
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?
Correct Answer
A. Uninterruptible power supply
Explanation
An uninterruptible power supply (UPS) is the most suitable solution for preventing file corruption and ensuring a graceful shutdown during extreme weather conditions. A UPS provides battery backup power when the main power source fails or fluctuates. This ensures that the computer system remains powered on and operational for at least one hour, allowing sufficient time to save files and shut down properly. Surge protectors, power strips, and power distribution units do not provide battery backup and therefore do not meet the user's requirements.
33.
Which of the following installation types would require the use of an answer file to install the OS?
Correct Answer
A. Unattended
Explanation
An unattended installation type refers to the process of installing an operating system without any user interaction. It requires the use of an answer file, which contains all the necessary configuration settings and preferences for the installation. This file automates the installation process and eliminates the need for manual input from the user. Therefore, the correct answer is "Unattended" because it is the only installation type that requires the use of an answer file.
34.
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
Correct Answer
A. Time Machine
Explanation
Time Machine is the correct answer because it is a built-in utility in MAC operating systems that allows users to back up and restore their data. It creates regular backups of the entire system, including files, applications, and settings. By using Time Machine, the user can easily access the previously stored data and restore it to their MAC after the operating system corruption and file deletion caused by malware.
35.
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?
Correct Answer
A. Grupdate
Explanation
The technician should use the "grupdate" command-line tool to apply the new policy. This tool is commonly used to update Group Policy settings on a Windows computer. By running the "grupdate" command, the technician can force the computer to refresh its Group Policy settings and apply any changes, including the new policy that limits access to removable hard drives. This will ensure that the policy takes effect and prevents unauthorized access to USB removable hard drives.
36.
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?
Correct Answer
A. End-user education
Explanation
The technician should have covered end-user education as part of the original repair. This means that the technician should have educated Joe on how to prevent future virus infections and how to recognize the symptoms of a virus. By providing end-user education, Joe would have been better equipped to avoid the return of the symptoms and prevent further virus infections.
37.
In which of the following file extension types would a user expect to see the command. "net use T:\serverfiles"?
Correct Answer
A. .bat
Explanation
A user would expect to see the command "net use T:\serverfiles" in a file with the .bat extension. The .bat extension is commonly used for batch files, which are scripts that contain a series of commands that can be executed in sequence. The "net use" command is used to connect to shared network resources, and in this case, it is used to map the T: drive to a folder on the server called "serverfiles". Therefore, the user would expect to see this command in a .bat file.
38.
A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?
Correct Answer
A. Roll back updates
Explanation
Rolling back updates would be the most likely solution to fix the issue because the problem started after the updates were installed. By rolling back the updates, the system will revert to the previous state before the updates were applied, which may resolve any compatibility or configuration issues that were introduced by the updates.
39.
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?
Correct Answer
A. Image deployment
Explanation
The technician is most likely performing image deployment on the computer. PXE booting is a method of booting a computer from a network interface, allowing the computer to retrieve an operating system image or installation files from a network server. This process is commonly used for deploying images to multiple computers simultaneously, making it the most likely scenario in this case.
40.
Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?
Correct Answer
A. Single-factor
Explanation
The given scenario suggests that Joe is being prompted to provide only his username and password to access the payroll system. This indicates that the authentication method being requested is single-factor authentication. Single-factor authentication relies on a single piece of information (in this case, the username and password) to verify the user's identity.
41.
Which of the following devices provides protection against brownouts?
Correct Answer
A. Battery backup
Explanation
A battery backup provides protection against brownouts by supplying power from its own battery during periods of low voltage or temporary power outages. This ensures that connected devices receive a consistent and stable power supply, preventing damage or data loss that can occur during brownouts. Surge suppressors, rack grounding, and line conditioners do not specifically address the issue of brownouts.
42.
A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
Correct Answer
A. Sudo
Explanation
The correct answer is "sudo". The "sudo" command allows a user with the necessary privileges to execute commands as a superuser or another user. In this case, the junior Linux system administrator can use "sudo" to gain the necessary permissions to update the system software.
43.
A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?
Correct Answer
A. Guest
Explanation
The user is described as a "Guest" because they do not have the necessary permissions to install a local printer. Guests typically have limited access and privileges on a Windows system, which would explain their inability to complete the installation.
44.
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?
Correct Answer
A. Rootkit
Explanation
The user most likely has a rootkit infection. Rootkits are malicious software that allow unauthorized access to a computer system, often by hiding their presence and granting remote control to an attacker. The presence of unknown processes running in the background indicates that the user's system has been compromised, and the recent download from the internet could have been the source of the rootkit infection.
45.
Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?
Correct Answer
A. Driver detection
Explanation
The feature that has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process is driver detection. In Windows 10, the operating system has improved its ability to automatically detect and install the necessary drivers for hardware components, reducing the need for manual driver installation. This simplifies the installation process for users and ensures that their hardware is properly supported by the operating system.
46.
Which of the following is considered government-regulated data?
Correct Answer
A. PII
Explanation
PII, which stands for Personally Identifiable Information, is considered government-regulated data. PII refers to any information that can be used to identify an individual, such as their name, social security number, or financial information. The government regulates the collection, storage, and use of PII to protect individuals' privacy and prevent identity theft or misuse of personal information. Therefore, PII is considered government-regulated data.
47.
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?
Correct Answer
A. Air filters
Explanation
During construction, there is a high chance of dust, dirt, and debris in the air, which can be detrimental to the sensitive equipment in a server room. Therefore, the team should use air filters at the site to minimize the risk of these particles entering the server room and causing damage to the servers and other equipment. Air filters will help to maintain a clean and controlled environment, ensuring the smooth functioning of the temporary server room during construction.
48.
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?
Correct Answer
B. SSH
Explanation
SSH (Secure Shell) is the correct answer because it provides a secure and encrypted method for remote access to network devices such as switches and routers. Unlike Telnet, which transmits data in plain text, SSH encrypts the data, making it more secure against eavesdropping and unauthorized access. RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are used for remote desktop access and control, not specifically for accessing network devices.
49.
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
Correct Answer
B. 4GB
Explanation
A 32-bit version of Windows has a memory limit of 4GB. This is because 32-bit systems can only address a maximum of 4GB of memory. However, due to hardware and system requirements, the actual usable memory may be slightly less than 4GB.
50.
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?
Correct Answer
A. Visit the Microsoft Update website to see if there is an issue with a specific update
Explanation
The technician should first visit the Microsoft Update website to see if there is an issue with a specific update. This is because the website provides information on known issues and solutions for updates. By checking the website, the technician can determine if the failed updates are a result of a known issue and find instructions on how to resolve the problem. This step can help save time and effort in troubleshooting the updates.