Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA 220-1102 Dumps Questions Answers

Page: 1 / 63
Total 845 questions

CompTIA A+ Certification Core 2 Exam Questions and Answers

Question 1

Which of the following would most likely be used to extend the life of a device?

Options:

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Buy Now
Question 2

Which of the following threats will the use of a privacy screen on a computer help prevent?

Options:

A.

Impersonation

B.

Shoulder surfing

C.

Whaling

D.

Tailgating

Question 3

A user wants to back up a Windows 10 device. Which of the following should the user select?

Options:

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Question 4

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

Options:

A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

Question 5

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

Options:

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Question 6

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

Options:

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Question 7

Which of the following filesystem types does macOS use?

Options:

A.

ext4

B.

exFAT

C.

NTFS

D.

APFS

Question 8

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

Options:

A.

Disable Wi-Fi autoconnect.

B.

Stay offline when in public places.

C.

Uninstall all recently installed applications.

D.

Schedule an antivirus scan.

E.

Reboot the device

F.

Update the OS

Question 9

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

Options:

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Question 10

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

Options:

A.

Run an AV scan.

B.

Reinstall the operating system

C.

Install a software firewall.

D.

Perform a system restore.

E.

Comply with the on-screen instructions.

Question 11

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

Options:

A.

Restart the wireless adapter.

B.

Launch the browser to see if it redirects to an unknown site.

C.

Instruct the user to disconnect the Wi-Fi.

D.

Instruct the user to run the installed antivirus software.

Question 12

A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

Options:

A.

certmgr.msc

B.

msconfig.exe

C.

lusrmgr.msc

D.

perfmon.msc

Question 13

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Options:

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Question 14

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

Options:

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Question 15

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

Options:

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

Question 16

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Question 17

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Question 18

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

Options:

A.

Assigning share permissions

B.

Enabling inheritance

C.

Requiring multifactor authentication

D.

Removing archive attribute

Question 19

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

Options:

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Question 20

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Question 21

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

Options:

A.

Uninstalling the application

B.

Gaining root access to the tablet

C.

Resetting the web browser cache

D.

Deleting the application cache

E.

Clearing the application storage

F.

Disabling mobile device management

Question 22

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

Options:

A.

Power Plans

B.

Hibernate

C.

Sleep/Suspend

D.

Screensaver

Question 23

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Options:

A.

Verify the DNS server settings.

B.

Turn off the Windows firewall.

C.

Confirm the subnet mask is correct.

D.

Configure a static IP address.

Question 24

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

Options:

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

Question 25

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Question 26

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Question 27

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

Options:

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Question 28

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Question 29

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

Options:

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Question 30

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

Options:

A.

SSL key

B.

Preshared key

C.

WPA2 key

D.

Recovery key

Question 31

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

Options:

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Question 32

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

Options:

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Question 33

Which of the following operating systems is considered closed source?

Options:

A.

Ubuntu

B.

Android

C.

CentOS

D.

OSX

Question 34

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

Options:

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Question 35

Which of the following would most likely be used in a small office environment?

Options:

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

Question 36

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

Options:

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Question 37

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

Options:

A.

nslookup

B.

net use

C.

netstat

D.

net user

Question 38

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Question 39

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

Options:

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Question 40

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Question 41

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Question 42

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

Options:

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Question 43

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

Options:

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Question 44

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.

Move the application to the desktop and press delete

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Question 45

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Question 46

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

Options:

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Question 47

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Question 48

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Question 49

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

Options:

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Question 50

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

Options:

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Question 51

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Question 52

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

Options:

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Question 53

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Options:

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Question 54

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

Options:

A.

Screen share

B.

MSRA

C.

Virtual network computer

D.

RDP

Question 55

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Question 56

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

Options:

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Question 57

Which of the following features can be used to ensure a user can access multiple versions of files?

Options:

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Question 58

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

Options:

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Question 59

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Question 60

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

Options:

A.

NAT

B.

WPA3

C.

802.1X

D.

Static IP

Question 61

Which of the following Linux commands would help to identify which directory the user is currently operating in?

Options:

A.

pwd

B.

dig

C.

find

D.

cat

Question 62

Which of the following features can a technician use to ensure users are following password length requirements?

Options:

A.

Group Policy

B.

Log-on script

C.

Access controllist

D.

Security groups

Question 63

A technician needs to implement a system to handle both authentication and authorization. Which of the following meets this requirement?

Options:

A.

WPA3

B.

MFA

C.

TACACS+

D.

RADIUS

Question 64

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

Options:

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Question 65

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

Options:

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Question 66

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings

B.

Implementing expiration policies

C.

Defining complexity requirements

D.

Updating antivirus definitions

Question 67

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

Options:

A.

Action Center

B.

Task Manager

C.

Resource Monitor

D.

Security Configuration Wizard

E.

Event Viewer

Question 68

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Question 69

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

Options:

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Question 70

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

Options:

A.

Device

B.

Business

C.

Network

D.

Operation

Question 71

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Question 72

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

Options:

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Question 73

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

Options:

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Question 74

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

• The install phase must be scripted to run over the network • Each computer requires a new SSD as the system drive, • The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).

Options:

A.

net use

B.

robocopy

C.

winver

D.

diskpart

E.

sfc

F.

r.etstat

G.

ping

Question 75

A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?

Options:

A.

netstat

B.

tracert

C.

net use

D.

net user

E.

nslookup

Question 76

A customer recently upgraded their computer to the latest Windows version and is now having issues with the display. The icons and text are too large, and the colors are not accurate. Which of the following Control Panel options should the technician adjust to help the customer?

Options:

A.

Ease of Access

B.

Device Manager

C.

Network and SharingCenter

D.

Programs and Features

Question 77

A user reports that a system is performing unusually and is sending requests to an unfamiliar IP address every five minutes. Which of the following should the technician check first to troubleshoot the issue?

Options:

A.

Application logs

B.

Running processes

C.

Antivirus scans

D.

Recent system updates

Question 78

A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:

IPv4 Address............ 192.168.0.74

Subnet Mask.............255.255.255.255

Default Gateway......... 192.168.0.1

Which of the following is most likely the reason for the issue?

Options:

A.

The default gateway is up.

B.

The user has an APIPA IP address.

C.

The IP address is on the wrong subnet

D.

The subnet mask is incorrect.

Question 79

Which of the following types of malicious software is most likely to demand payments in cryptocurrency?

Options:

A.

Ransomware

B.

Keylogger

C.

Cryptomining

D.

Rootkit

Question 80

Which of the following operating systems uses the ext4 filesystem type?

Options:

A.

macOS

B.

iOS

C.

Linux

D.

Windows

Question 81

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Question 82

Which of the following is a situation in which a surge suppressor is considered critical?

Options:

A.

The electrical source is not grounded.

B.

A device requires 220V or higher.

C.

A device is being turned on for the first time.

D.

The electrical source is near high humidity.

Question 83

Which of the following methods is a way to superficially delete files on a hard drive?

Options:

A.

Drilling

B.

Degaussing

C.

Wiping

D.

Shredding

E.

Low-level formatting

Question 84

Internet speeds on a user's Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings. Which of the following should the technician check to verify the proxy configuration?

Options:

A.

Network and Sharing Center

B.

Internet Options

C.

Firewall settings

D.

System settings

Question 85

A workstation does not recognize a printer. However, the previous day. the printer successfully received a job from the workstation. Which of the following tools should a technician use to see what happened before the failure?

Options:

A.

Performance Monitor

B.

Devices and Printers

C.

Task Scheduler

D.

Event Viewer

Question 86

A user's access to a website Is being blocked. Other users on the same network are also unable to access the website. However, when using personal mobile phones not connected to the network, users can access the website. Which of the following is preventing access to the website?

Options:

A.

Antivirus

B.

Proxy server

C.

Windows Firewall

D.

ISP settings

Question 87

Which of the following is the most secure screen lock?

Options:

A.

Face

B.

Swipe

C.

Password

D.

Fingerprint

Question 88

A company is transitioning to a new firewall and discovers that one of the servers is still sending traffic to the old firewall. Which of the following IP address settings should a technician change to resolve this issue?

Options:

A.

Dynamic

B.

Gateway

C.

NAT

D.

DNS server

Question 89

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

Options:

A.

Make the user a member of Domain Admins.

B.

Add the user to the local Administrators group.

C.

Let the user use credentials from another user who has rights.

D.

Give the user the local, high-privileged account password.

Question 90

A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?

Options:

A.

Install signal repeaters.

B.

Edit the hosts file.

C.

Configure the firewall.

D.

Enable port forwarding.

Question 91

A technician is dispatched to a user's office to connect a PC to an office printer. The technician notices several documents on the user's desk that display other technicians' PII. Which of the following should the technician do to maintain proper professionalism?

Options:

A.

Disclose the experience with other coworkers.

B.

Educate the user about safeguarding documents.

C.

Report the incident to a supervisor.

D.

Make a copy of the document to share with the legal team.

Question 92

A user sent a large amount of money to a supplier's bank account and claims that the Chief Executive Officer instructed the user to do so. A technician informs the user that the request was fraudulent and contacts the authorities. Which of the following types of attack took place?

Options:

A.

Spoofing

B.

Phishing

C.

Whaling attack

D.

Insider threat

Question 93

Which of the following is the first step to prevent unauthorized access on a lost mobile device?

Options:

A.

Configure the screen lock.

B.

Enable two-factor authentication.

C.

Set up remote wipe.

D.

Activate geofencing.

Question 94

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Question 95

After access to a server room was breached, a technician needs to implement a secure method to prevent unauthorized access. Which of the following is the most secure solution?

Options:

A.

Smart cards

B.

Key fobs

C.

Biometrics

D.

Security guard

Question 96

A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?

Options:

A.

Schedule and perform an antivirus scan and system update

B.

Educate the end user on internet usage

C.

Perform a system scan to remove the malware

D.

Create a system restore point

Question 97

A customer is explaining issues with a workstation to a technician. While the customer is listing the issues, the technician is browsing social media on a smartphone. Which of the following professionalism and communication techniques should the technician be using in this situation? (Select two).

Options:

A.

Follow up with the customer.

B.

Avoid personal interruptions.

C.

Provide proper documentation.

D.

Clarify customer statements.

E.

Actively listen and take notes.

F.

Maintain professional attire.

Question 98

A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

Options:

A.

Ask the company's human resources department to address the issue.

B.

Notify the project manager about the user's concern.

C.

Tell the user that this request is not on the list to be upgraded.

D.

Ask the user's supervisor if the technician should upgrade the computer.

Question 99

A change management review board denied an administrator's request for change. The administrator had provided the purpose and scope of the change, the date and time, and impacted systems with the risk analysis. Which of the following should be included to approve this change?

Options:

A.

End-user acceptance

B.

Cost analysis

C.

Rollback plan

D.

Standard maintenance window

Question 100

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

Options:

A.

NIC

B.

USB

C.

GPU

D.

HDMI

Question 101

Which of the following is protected by government policy for end-user information?

Options:

A.

DRM

B.

EULA

C.

PCI

D.

PII

Question 102

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

Options:

A.

TheswitchIs only providing IPv6 addresses.

B.

TheOS must be updated to be compatible with the imaging software.

C.

Theswitchhas port security enabled.

D.

Theswitchdoes not support multicast traffic.

Question 103

A technician receives a help desk ticket regarding a software issue on a workstation. The workstation provides the only access to a corporate database, and the technician needs to recover the workstation quickly. Which of the following actions should the technician take?

Options:

A.

Restore the workstation from the last backup.

B.

Reinstall the operating system.

C.

Run the System File Checker.

D.

Run the Hardware Diagnostics tool.

Question 104

The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the text larger when the user shares the computer screen. When not in meetings, the user wants the text be smaller for work tasks. Which of the following is the most efficient way to change text font size?

Options:

A.

Issuinga laptop to the user with increased font size to be used only for meetings

B.

Using display settings to adjust the text size during meetings

C.

Addinga local user account, which has a larger font size set, for the user to log In toduring meetings

D.

Addinga second monitor to the user's desktop and increase the font size for only that display

Question 105

A user’s personal computer was infected with malware that had a known remediation. Which of the following should the user have done to prevent this issue?

Options:

A.

Kept endpoint protection software updated

B.

Created a restore point

C.

Maintained a preinstallation environment

D.

Disabled System Restore

Question 106

Which of the following features allows a user to install software from a DVD even when the laptop running macOS does not have an optical drive?

Options:

A.

Disk Utility

B.

Remote Disc

C.

Multiple Desktops

D.

Target Disk

Question 107

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

Options:

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Question 108

Which of the following script file types is typically used to install Windows packages?

Options:

A.

.js

B.

.py

C.

.ps1

D.

.sh

Question 109

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

Options:

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Question 110

During a routine check, a systems administrator discovers that a user's PC is running slowly and CPU utilization is at 100%. Further investigation shows a large amount of resource usage. Which of the following is the most likely cause of the high resource usage?

Options:

A.

Firewall activities

B.

Botnet attack

C.

DDoS attack

D.

Keylogger attack

Question 111

A user's Android phone has been randomly restarting. A technician investigates and finds several applications have been installed that are not available within the standard marketplace. Which of the following is most likely the cause of the issue?

Options:

A.

The OS update failed.

B.

The user downloaded malware.

C.

The device is In developer mode.

D.

The over-the-air carrier update failed.

Question 112

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

Options:

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Question 113

A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop:

Which of the following should the technician do to connect via RDP?

Options:

A.

Confirm the user can ping the default gateway.

B.

Change the IP address on the user's laptop.

C.

Change the subnet mask on the user's laptop.

D.

Open port 3389 on the Windows firewall.

Question 114

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

Options:

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Question 115

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.

Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?

Options:

A.

Uninstall the new program.

B.

Check the HOSTS file.

C.

Restore from a previous backup.

D.

Clear the web browser cache.

Question 116

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

Options:

A.

Access control list

B.

Multifactor authentication

C.

Least privilege

D.

Mobile device management

Question 117

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Question 118

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Question 119

A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?

Options:

A.

Click proceed.

B.

Report the employee to the human resources department for violating company policy.

C.

Restore the computer from the last known backup.

D.

Close the browser window and report the email to IT security.

Question 120

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Question 121

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

Options:

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Question 122

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

Options:

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Question 123

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

Options:

A.

DHCP

B.

Firewall

C.

SSD

Question 124

Which of the following involves sending arbitrary characters in a web page request?

Options:

A.

SMS

B.

SSL

C.

XSS

D.

VPN

Question 125

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

Options:

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Question 126

Which of the following does MFA provide?

Options:

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

Question 127

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

Options:

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Question 128

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

    Copy the program file to a USB drive and install.

Options:

A.

Burn the program file to a CD and install.

B.

Format the HDD and then do the installation.

C.

Replace the HDD and then do the installation.

Question 129

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

Options:

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Question 130

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

Options:

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Question 131

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

Options:

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Question 132

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

D.

Run an antivirus and enable encryption.

Question 133

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

    Do not notify the customer if arriving before the customer.

Options:

A.

Dismiss the customer and proceed with the after-hours work.

B.

Contact the customer if the technician is arriving late.

C.

Disclose the experience via social media.

Question 134

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Question 135

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

Options:

A.

Group Policy

B.

Browser extension

C.

System Configuration

D.

Task Scheduler

Question 136

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Options:

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Question 137

Which of the following is command options is used to display hidden files and directories?

Options:

A.

-a

B.

-s

C.

-lh

D.

-t

Question 138

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

Options:

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Question 139

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

Options:

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Question 140

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

Options:

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Question 141

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

Options:

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Question 142

A large organization is researching proprietary software with vendor support for a multiuser environment. Which of the following EULA types should be selected?

Options:

A.

Corporate

B.

Perpetual

C.

Open-source

D.

Personal

Question 143

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

Options:

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Question 144

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

Options:

A.

Scan for malware and ransomware.

B.

Perform a system restore.

C.

Check the network utilization.

D.

Update the antivirus software.

Question 145

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

Options:

A.

APFS

B.

FAT32

C.

NTFS

D.

ext4

Question 146

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Question 147

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Question 148

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Question 149

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

Options:

A.

Reinstalling Windows

B.

Performing a quick format

C.

Using disk-wiping software

D.

Deleting all files from command-line interface

Question 150

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Options:

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Question 151

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Options:

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

Question 152

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Question 153

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Question 154

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Options:

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Question 155

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Options:

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Question 156

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Options:

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Question 157

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

Options:

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Question 158

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Question 159

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

Options:

A.

Quarantining system files

B.

Reimaging the workstation

C.

Encrypting the hard drive

D.

Disabling TLS 1.0 support

Question 160

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Question 161

Which of the following Linux commands would be used to install an application?

Options:

A.

yum

B.

grep

C.

Is

D.

sudo

Question 162

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

Options:

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Question 163

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Question 164

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

Options:

A.

Encryption

B.

Wi-Fi channel

C.

Default passwords

D.

Service set identifier

Question 165

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

Options:

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Question 166

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Options:

A.

Shut down the infected computer and swap it with another computer

B.

Investigate what the interface is and what triggered it to pop up

C.

Proceed with initiating a full scan and removal of the viruses using the presented interface

D.

Call the phone number displayed in the interface of the antivirus removal tool

Question 167

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Question 168

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

Options:

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

Question 169

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

Options:

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Question 170

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Options:

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Question 171

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

Options:

A.

Verify all third-party applications are disabled

B.

Determine if the device has adequate storage available.

C.

Check if the battery is sufficiently charged

D.

Confirm a strong internet connection is available using Wi-Fi or cellular data

Question 172

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Options:

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Question 173

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

Options:

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Question 174

Which of the following is the MOST important environmental concern inside a data center?

Options:

A.

Battery disposal

B.

Electrostatic discharge mats

C.

Toner disposal

D.

Humidity levels

Question 175

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Options:

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Question 176

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Options:

A.

Pretexting

B.

Spoofing

C.

Vishing

D.

Scareware

Question 177

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Options:

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Question 178

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Question 179

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

Options:

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

Question 180

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Question 181

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Question 182

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Question 183

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Question 184

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Options:

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Question 185

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

Options:

A.

Internet-based upgrade

B.

Repair installation

C.

Clean install

D.

USB repair

E.

In place upgrade

Question 186

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

Options:

A.

Document the date and time of change.

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document findings of the sandbox test.

Question 187

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

Options:

A.

Enable firewall ACLs.

B.

Examine the localhost file entries.

C.

Verify the routing tables.

D.

Update the antivirus definitions.

Question 188

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

Options:

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Question 189

A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

Options:

A.

SSH

B.

VPN

C.

VNC

D.

RDP

Question 190

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Question 191

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Question 192

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

Options:

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Question 193

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

Options:

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Question 194

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

Options:

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Question 195

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

Options:

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Question 196

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

Options:

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Question 197

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Question 198

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Question 199

Which of the following is used to explain issues that may occur during a change implementation?

Options:

A.

Scope change

B.

End-user acceptance

C.

Risk analysis

D.

Rollback plan

Question 200

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Options:

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Question 201

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Options:

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Question 202

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Options:

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Question 203

Which of the following script types is used with the Python language by default?

Options:

A.

.ps1

B.

.vbs

C.

.bat

D.

.py

Question 204

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Question 205

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

Options:

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

Question 206

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Question 207

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

Options:

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

Question 208

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Question 209

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Question 210

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Question 211

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

Options:

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Question 212

Which of the following is MOST likely used to run .vbs files on Windows devices?

Options:

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Question 213

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.

Private-browsing mode

B.

Invalid certificate

C.

Modified file

D.

Browser cache

Question 214

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Question 215

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

Options:

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

Question 216

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Question 217

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

Options:

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Question 218

Which of the following is the default GUI and file manager in macOS?

Options:

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Question 219

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

Options:

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

Question 220

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Question 221

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

Options:

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Question 222

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Question 223

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Question 224

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Options:

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Question 225

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?

Options:

A.

The computer's CMOS battery failed.

B.

The computer's NIC is faulty.

C.

The PXE boot option has not been enabled

D.

The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Question 226

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Options:

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Question 227

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

Options:

A.

taskschd.msc

B.

perfmon.msc

C.

lusrmgr.msc

D.

Eventvwr.msc

Question 228

Which of the following is the STRONGEST wireless configuration?

Options:

A.

WPS

B.

WPA3

C.

WEP

D.

WMN

Question 229

Which of the following data is MOST likely to be regulated?

Options:

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Question 230

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

Question 231

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

Options:

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Question 232

Which of the following is the MOST basic version of Windows that includes BitLocker?

Options:

A.

Home

B.

pro

C.

Enterprise

D.

Pro for Workstations

Question 233

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

Options:

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

Question 234

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Question 235

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Question 236

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Question 237

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Options:

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Question 238

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

Options:

A.

Enabling System Restore

B.

Educating the user

C.

Booting into safe mode

D.

Scheduling a scan

Question 239

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

Options:

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Question 240

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Question 241

Which of the following is MOST likely contained in an EULA?

Options:

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Question 242

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

Question 243

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Question 244

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

Options:

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Question 245

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?

Options:

A.

Require the user to change the password at the next log-in.

B.

Disallow tie user from changing the password.

C.

Disable the account

D.

Choose a password that never expires.

Question 246

A help desk technician runs the following script: Inventory.py. The technician receives the following error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

Options:

A.

Scripts are not permitted to run.

B.

The script was not built for Windows.

C.

The script requires administrator privileges,

D.

The runtime environment is not installed.

Question 247

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Question 248

Which of the following command-line tools will delete a directory?

Options:

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Question 249

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Question 250

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

Options:

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Question 251

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Options:

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Question 252

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.

Enable multifactor authentication.

B.

Increase the failed log-in threshold.

C.

Remove complex password requirements.

D.

Implement a single sign-on with biometrics.

Question 253

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

Options:

A.

resmon_exe

B.

dfrgui_exe

C.

msinf032exe

D.

msconfig_exe

Exam Detail
Vendor: CompTIA
Certification: A+
Exam Code: 220-1102
Last Update: Nov 3, 2025
220-1102 Question Answers
Page: 1 / 63
Total 845 questions