A technician arrives on site to find that two users who have the same model on Android smartphone arehaving the s ...


A technician is working on a Windows 10 PC that is running slowly.Which of the following commands should the tech ...


An administrator is setting up a Windows terminal server. Which of the following settings should theadministrator ...


A company has hired a new IT firm to manage its network switches and routers.The firm is geographically separated ...


A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gainaccess. ...


A client wants a technician to create a PC naming convention that will make the client’s PCs easier to trackand ...


Which of the following provide the BEST security for a server room. (Select two.)


Which of the following threats uses personalized information in an attempt at obtaining information.


A technician receives an invalid certificate error when visiting a website with port 443 enabled. Othercomputers ...


A department in an organization set up a proxy server to manage its Internet stage. A technician isconfiguring th ...


Which of the following is the amount of memory a user is limited to with a 32 bit version of Windows.


A technician is working at a help desk form and receives a call from a user who has experienced repeatedBSODs. T ...


A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because thedata is ...


Which of the following devices are MOST likely to have a grounding wire attached to them based on themanufacturer ...


A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, thetechn ...


A technician is installing a private PC in a public workspace. Which of the following password practicesshould th ...


Joe, an employee, took a company issues Windows laptop home, but is having trouble connecting to any ofthe share ...


A user believes there is a virus on a laptop. The user installs additional real time protection antivirussoftwar ...


A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS.The user states ...


Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After aboutten minu ...


Which of the following security methods BEST describes when a user enters a username and passwordonce for multipl ...


A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will haveaccess ...


A technician has been asked to recommend antivirus software for a home PC, but the user does not wantto pay for a ...


Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan isto t ...


A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lostall data and ...


A technician is running updates on a Windows P


A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the ...


A technician has identified malware on a user’s system. Which of the following should the technician doNEXT acc ...


A user’s Windows laptop has become consistently slower over time. The technician checks the CPUutilization and ...


A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown whileproviding a ...


Which of the following installation types would require the use of an answer file to install the OS.


A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded.The user ne ...


A manager requests remote access to a server after hours and on weekends to check data. The managerinsists on usi ...


A manager with a restricted user account receives the following error message:Windows Update cannot currently che ...


A SOHO technician recently moved some data from one server to another to increase storage capacity.Several users ...


With which of the following types is a man in the middle attack associated.


An employee reported that a suspicious individual was looking through the recycle bin. Which of thefollowing type ...


A SOHO user reports desktop applications are performing slowly, and no emails have been received allmorning. A te ...


An employee is unable to view in office network folders while working at home. Which of the following is theMOST ...


A network administrator has given a technician documentation detailing the switchports the technician willneed to ...


After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked withlimiting remo ...


A network administrator notifies a technician that the company is experiencing a DDoS attack. Severalinternal Win ...


Ann, a user, is attempting to log in to her email service form a third party email client on her phone. WhenAnn ...


Joe, a user, returns his computer to the technician who performed a virus removal on it the week before.Joe state ...


In which of the following file extension types would a user expect to see the command. “net use T:\serverfiles ...


A user contacts a technician to troubleshoot server errors. The user explains that some files will not openon the ...


Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairinga PC. ...


Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory,power s ...


Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears tobe conne ...


A project team is organized to implement a new wireless solution for a school. The team has already donethe netwo ...


A user calls the help desk regarding a new Windows issues that started in the morning. The user can nolonger use ...


An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST toresolve t ...


A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. Theuser r ...


A technician is PXE booting a computer. Which of the following is the technician MOST likely performing onthe com ...


Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe,the t ...


Which of the following is the maximum RAM limit of a Windows 32 bit version.


A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. Whenthe user ...


Joe, an end user, has been prompted to provide his username and password to access the payroll system.Which of th ...


Which of the following devices provides protection against brownouts.


Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When shegets a messa ...


A junior Linux system administrator needs to update system software. Which of the following shellcommands would a ...


A small business has an open wireless network so vendors can connect to the network without logging in.The busine ...


A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still doesnot ...


A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even w ...


A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the followi ...


An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is ...


A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one ...


A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an or ...


A company brings in contractors several times a year to perform inventory, and the contractors use company supp ...


A wireless access point is going to be configured in a small office located in a crowded building. Which of the ...


A technician is installing Windows 7 64 bit OS on a VM but keeps getting errors. The specifications for the mal ...


A technician is working on a user’s workstation and notices a lot of unknown processes running in the back ...


Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and grea ...


Which of the following is considered government regulated data.


A small business has an open WiFi network for employees but does not want customers to connect to the access poi ...


A security team is auditing a company’s network logs and notices that a USB drive was previously inserted ...


A technician is installing the latest OS on a user’s system. The user wants all of the settings and file t ...


A team needs to deploy a temporary server room at a site to provide support during construction. Which of the fo ...


A computer becomes infected with malware, which manages to steal all credentials stored on the P


Which of the following technologies is used by malicious employees to obtain user passwords.


A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriat ...


A user reports that when opening a web browser, the initial page loads to a search engine the user does not reco ...


A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of th ...


Which of the following is the MOST secure wireless security protocol.


Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is wo ...


Corporate management is concerned about the security of the company’s mobile phones, in the event they are ...


A technician repaired a laptop for a customer. The customer then complained the repair took too long and questio ...


A user is attempting to install an application and receives an error stating there is not enough space to instal ...


Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work ...


A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The ...


A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old ma ...


A user reports malware activity on an isolated workstation used for testing. It is running an end of life OS, ...


A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive ...


Which of the following technologies can be utilized in a wireless network environment to provide secure SSO acce ...


A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of th ...


Which of the following built in accounts was removed in Windows 10.


A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the ...


Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for ...


After a security audit, a technician is tasked with implementing new measures to help secure company workstation ...


A new business will be using credit cards in a physical location as well as its web presence. Which of the follo ...


A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus progr ...


A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that ...


A company’s security policy does not allow USB drives to be available in workstations. However, an excepti ...


A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and pl ...


Which of the following would a technician use to store memory chips from a laptop safely after an upgrade.


Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he di ...


A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There ar ...


A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, w ...


A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the follo ...


Which of the following provide the MOST security for PCs and mobile devices. (Choose two.)


A network administrator needs to be able to securely connect to a local router from within the office. Which of ...


A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only ...


Users notify the help desk of an email that was just received. The email came from the help desk’s email a ...


A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes ...


A user’s corporate email is missing the shared inbox folders that were present before the user went on vac ...


During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upg ...


An office manager emails a technical support contractor about a new desktop for one of the workers. The office m ...


Which of the following installation methods will allow a technician to resolve issues that may arise while the i ...


A new company policy states that all end user access to network resources will be controlled based on the users ...


A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which ...


A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing websit ...


A user calls a technician to report issues when logging in to a vendor’s website. The technician is able t ...


Which of the following BEST describes the purpose of an ESD mat.


Which of the following is a reason to use WEP over WPA.


When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs ...


Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on loc ...


A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My D ...