A technician is instructed to configure a new workstation to boot the OS from the network. The technicianmust ena ...


A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned driveletters, ...


When using Microsoft Windows 8.1 Operating System, which of the following features allows scripts andsnippets to ...


A PC technician notices that the printers deployed via a new Group Policy are not showing up on theworkstation. W ...


A technician is tasked with installing Windows on numerous network PCs. Which of the following is theQUICKEST met ...


A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use thebuilt in ...


A technician is remotely connecting to a workstation using SSH to transfer a security hotfix. Which of thefollowi ...


A small office experiences frequent power outages. Upon rebooting the Windows workstations after eachpower outage ...


Which of the following updates should be performed on a regular basis to ensure the OS has the latestsecurity pat ...


A technician is trying to install Windows on a computer. The install process reports there are no storagedevices ...


A customer with a PC has requested assistance setting up Windows 7 parental controls within the webbrowser. The c ...


A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but thecomputer doe ...


An administrator has a new workstation that has been loaded with the Windows OS and configured with theproper IP ...


A technician is attempting to remove malware from a customer’s workstation. Which of the followingControl Panel ...


Which of the following should be used to ensure that a Windows OS is functioning optimally.


An end user needs to completely re install Windows 7 on a home computer but it did not come with any OSdiscs. Ho ...


A user is unable to find the preferred default network printer in the printers list in the user profile. Which of ...


A technician needs to perform a backup while a system is running. Which of the following services allowsthis task ...


A technician has been tasked with loading the operating system on every PC with a blank hard drive on anetwork. T ...


A technician is navigating through a Windows OS via command prompt. The technician needs to displaythe content of ...


A network administrator needs to connect to resources from an offsite location while ensuring the traffic isprote ...


A user states that when typing in directions on a navigation website, the map is not viewable in a newer webbrows ...


A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to moveto the nex ...


An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a sharednetwo ...


Ann, a user, discovers that all of her documents will not open. The documents open properly on anothercomputer. W ...


A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser.Which of ...


A technician has completed the installation of Windows 7 and needs to add it to the company’s domain.Which of t ...


A technician is installing 40 new bare metal computers into the corporate domain. The Windows 8.1 OSand an Office ...


A programmer installed a modified DLL file and is having problems with Windows not running correctly now.Which of ...


A second hard drive is added to a Windows desktop. A technician must initialize and create volumes on thedrive. W ...


A technician needs to verify and replace important individual system files on a Windows computer. Whichof the fol ...


After several recent application updates, a technician has noticed a marked change in the performance ofthe OS on ...


After a Windows update operation, a user reports a Windows 8.1 PC with specialized software isexperiencing system ...


Which of the following Windows tools allows a user to save system configuration information, systemsettings, prog ...


In recent versions of the Windows OS, Microsoft has added an advanced version of the command prompt.Which of the ...


A systems administrator wants to install the latest version of Windows on a desktop P


A technician is setting up a folder on the network that is available for all users in the executive department.Th ...


Prior to installing a new driver update, a technician wants to create a restore point on a Windows 7 desktop.Whic ...


Which of the following network hosts would MOST likely provide the services needed to allow client accessto Inter ...


Which of the following best practices is used to fix a zero day vulnerability on Linux.


Which of the following tools is used to type or paste recovery commands directly into a Linux box.


A technician is installing Bluetooth speakers in a conference room. Which of the following will be theaverage ope ...


A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer.Which of the fo ...


A company that manages its own cloud, while utilizing a third party vendor to help manage storage, isimplementin ...


An administrator has a virtual client running but cannot receive network connectivity. The host workstationis abl ...


A Google account on an Android device by default will synchronize to which of the following locations.


How would a technician install Windows OS on a MAC OS computer without using third party software.


A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloudbasedservice. ...


Virtual machines provide users with the ability to do which of the following.


Which of the following features of a mobile device operates the touch screen.


A technician contacts the network administrator to request a list of all static IP addresses in the building.Whic ...


A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would likethe ...


Which of the following user types has a limited set of elevated privileges to allow for performance of somemainte ...


Which of the following terminal commands will display the contents of a directory.


A technician is working on a corporate computer and discovers illegal software in the system as well as keygenera ...


Which of the following Linux commands is used to edit a text file.


A technician is manually installing Windows on several computers in a mixed Windows/Apple environment.Manual inst ...


Which of the following allows a user to instantly synchronize mobile device contacts between two nearbydevices. ...


A user has an installed application that is not working properly after an update. Which of the following couldhel ...


A technician is helping an engineer set up a new server. The server’s primary functions will be to validateuser ...


Android is which of the following types of operating system.


A technician is working on a SOHO that wants to share sensitive files between two employees. Ann, theowner, wants ...


A network administrator is unable to install programs on a workstation. Which of the following is MOSTlikely the ...


A technician has been tasked with limiting the users who can connect to a network printer located centrallywithin ...


An end user has reported not receiving emails sent by a specific customer. Which of the following is theMOST like ...


A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked fora PIN. Whi ...


A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it thathas be ...


The type of security threat that uses computers or other networks to accept and pass on viruses is called:


Joe, a user, just downloaded a game onto his company phone. When he is not using the device, itunexpectedly dials ...


A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in theuse ...


When securing a mobile device, which of the following types of screen locks is the MOST secure.


A technician has upgraded four computers and would like to securely repurpose the hard drives for lateruse. Which ...


A technician is configuring a SOHO wireless router for a small business with three employees. After thethree empl ...


A technician is configuring wireless for a home office. The customer wants to prevent others fromaccessing the wi ...


A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHOrouter. ...


A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of thefollowin ...


Which of the following will help to protect an organization from further data exposure AFTER a list of userpasswo ...


A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which ofthe foll ...


Ann, an executive, reports that she received a call from someone asking for information about her emailaccount. W ...


A technician is configuring a new Windows computer for a home office. Which of the following steps shouldthe tech ...


Which of the following prevention methods is considered to be digital security.


Which of the following Windows features would be used to encrypt a single file or folder.


A turnstile is an example of which of the following forms of physical security.


A user wants to save a file into another user’s directory, but the file save is denied. Which of the following ...


A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition,the use ...


A technician is configuring a SOHO router to ensure network computers can only use secured protocols onthe Intern ...


A computer in a doctor’s office that has patient data on it is being replaced. Which of the following shouldbe ...


When securing a mobile device with a screen lock, which of the following lock types use the “something youknow ...


All of the workstations in the human resources department contain sensitive employee information. Whichof the fol ...


Which of the following are digital security measures. (Select TWO.)


Some users have reported that the OS on their computer looks different, and their data has been lost. Theadminist ...


A web hosting company has had vendors walk out of its datacenter with computer components. Goingforward, the comp ...


An administrator is setting up multifactor authentication on company laptops. Which of the following wouldBEST sa ...


Which of the following services is MOST likely used to allow access to internal resources by verifyingnetwork cre ...


A Chief Executive Officer (CEO) has ordered 20 new desktops. A technician is responsible for repurposingthe curre ...


A network administrator in an organization wishes to prohibit users from sending corporate email whileconnected t ...


Joe, an employee, has noticed that one of his designs is being marked at another company. He isconcerned that som ...


A desktop technician is creating an account management policy based on security best practices. Which ofthe follo ...


The practice of providing network access to users in the MOST secure manner is known as:


Which of the following techniques involves using common words or phrases in an attempt to crack apassword.


A laptop requires a user to place a finger on a scanner and type in a PIN to gain access. Which of thefollowing M ...


An end user is attempting to access a file sharing site to download files shared by a customer, but isreceiving ...


Joe, an end user, reports that the PC he uses periodically logs off his user account and displays a messagethat ...


A user advises that a computer is displaying pop ups when connected to the Internet. After updating andrunning a ...


A user reports that any URL entered redirects to the same web page. A technician concludes that the user’scompu ...


A user’s email inbox is suddenly receiving dozens of rejection messages from various mail servers. Whichof the ...


A technician receives a helpdesk ticket about an employee having a problem sending text messages with acompany An ...


A networked PC has started to display adware pop ups when the user opens the browser. Which of thefollowing best ...


Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and wouldlike ...


A customer reports that a smartphone is experiencing a very short battery life. The user has been using thisphone ...


A customer has recently installed several applications on a Windows 7 workstation and is now experiencingslow sys ...


A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning,it ru ...


After installing a critical update from Windows Update, a user accidentally types an incorrect URL into thebrowse ...


Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appearson the ...


An engineer working with large detailed CAD files notices over time that the workstation is takingsignificantly l ...


Joe, an end user, reports that the Windows PC he is using automatically locks when he leaves his deskand walks t ...


A Windows workstation is suspected of having malicious software that created an infected start up item orservice ...


A user reports unexpected icons appearing on the desktop. The technician identifies that the symptomspoint to a m ...


A user updates the video driver on the computer and it requests a restart after installation. The computernever g ...


A user is having issues with a Windows computer. Upon loading the operating system, several messagesappear referr ...


A user, Ann, receives a phone call from the company’s mail administrator who indicates her email accounthas bee ...


A mobile phone has started to respond slowly and erratically. The user has done a soft reset and theproblem still ...


A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keepsasking th ...


A technician receives a call regarding a PC’s slow performance. The client states that most applications areslo ...


A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine.Which of ...


Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFiicon i ...


Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He nownotice ...


Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internetaccess ...


Ann, a customer, reports that when she occasionally works in the office basement, her smartphone batterydrains fa ...


A system analyst must ascertain why icons are occasionally missing on a user’s laptop. The analyst hasdetermine ...


Ann, a user, reports that a website the company uses for time and attendance is not performing properly.The techn ...


While booting a Linux workstation, a runtime error occurs as the kernel is loading. The error message iswritten t ...


A technician arrives at a job site to troubleshoot a copier. Which of the following safely procedures areMOST app ...


A user frequently experiences local profile corruption on a Windows OS computer. After the user makes afourth cal ...


A user reports no Internet access from a laptop at the office. Other users within the company are alsoreporting I ...


A user is getting an “Invalid Certificate” error when browsing to secure sites on the Internet. Theerror appe ...


A technician suspects that a computer issue is caused by a failed NI


Which of the following is the BEST license type to comply with end user licensing agreement (EULA) termsfor comme ...


In preparation for an operating system upgrade, a technician is tasked with installing additional memorymodules i ...


Which of the following explains why it is important to secure Personally Identifiable Information (PII).


A customer calls the help desk to report an issue. The customer suggests that the problem is hardwarerelated, but ...


A customer has made several trouble calls to the help desk and is very irate. The technician that receivesthe cal ...


A customer is reporting a burning smell coming from a CRT monitor. Which of the following should betaken into con ...


A technician has purchased a new surge protector to protect equipment in the production environment. Thesurge pro ...


A new help desk technician receives a trouble call from a user. The issue is something the technician hasnever en ...


A technician is working on a home theater PC in a location where the electrical system may not be properlygrounde ...


When dealing with a difficult customer, which of the following is the BEST way to handle the situation.


A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of thefollowing ...


A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of thefollowing is t ...


A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comesto the ...


A manager suspects a user has obtained movies protected by copyright using a torrent client. An incidentresponse ...


A customer is experiencing issues with email and calls the help desk. The technician determines it wouldhelp clar ...


A user calls the help desk because a folder containing critical business files is missing from the local drive.Th ...


An administrator is conducting an investigation into the improper use of an organization’s PC by anemployee. Th ...


Multiple hard drives have been replaced in a file server that hosted highly confidential business data. Thedata o ...


Which of the following cloud synchronization options would BEST limit mobile data consumption whilemaintaining su ...


An office on a Caribbean Island experiences high heat and humidity and has suffered significant equipmentdamage i ...


A technician is replacing non working CRT monitors with flat screen monitors and has been asked by thecompany t ...


A company has just replaced an entire fleet of CRT monitors with LED flat screens as part of amodernization effor ...


Joe, a user, is on a VoIP call on his desktop when he notices an echo in the room. Upon investigation, itappears ...


After a data retention audit uncovered weakness in the process involving hard disk data, an administratorwas task ...


A user has a smartphone, but it has become difficult to select the apps or the correct area of the screen.Which o ...


A technician is on a service call assisting a user with a computer issue. While on the call, the technician’spe ...


A virtualization technician in an organization has been notified of a potential vulnerability in a softwareapplic ...


A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, butit can co ...


Ann, an end user, receives a call from someone claiming to be from the help desk and asking for herusername and p ...


Which of the following is the BEST option to prevent data breaches on lost mobile devices.


A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of thefollowing c ...


A user is configuring the email settings on a smartphone. Which of the following configurations will allow theuse ...


An end user receives an unsolicited and unencrypted email containing a co workers birth date and socialsecurity ...


Which of the following file formats does Android use for application installation.


A technician has decided to upgrade all users’ iPhones to the latest model. Which of the following is theFIRST ...


A technician has just installed a video card in a P


A network administrator notices a new WiFi connection has appeared as a wireless network choice and isalways at t ...


Which of the following is a security threat that disguises itself as legitimate software.


A technician is called into the office during a thunderstorm. Users are reporting that machines areintermittently ...


A customer reports very slow wireless connection speeds in the new office. Which of the following toolsshould a t ...


A user is experiencing a software application error. The user contacts a technician for support. Which of thefoll ...


A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicatesshe never ...


A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following isthe ...


Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slowperforma ...


A user has been granted permission to access the corporate network from a personal smartphone. Whichof the follow ...


Which of the following features is being used when a smartphone is used to purchase a product at a retailkiosk. ...


Which of the following security threats happens when another person enters a secured area with anauthorized perso ...


Which of the following is a risk of implementing a BYOD policy.


A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized usersfrom f ...


An administrator wants to give a user limited access rights in Windows Vista so that the user can installprinters ...


A user reports the Internet connection is not working on the corporate network. After running through thetroubles ...


A user reports several technicians have been unable to solve a problem and requests that the technician onthe pho ...


An IPS appliance is installed on the network. Which of the following is the purpose of the IPS.


A user wants to be able to access email from all devices. Which of the following formats should be used toallow t ...


Which of the following tasks is automatically added to the task scheduler in Windows to keep hard diskperformance ...


A user notices the social media apps are constantly updated with the user’s precise location. The user isworrie ...


A user’s personal laptop was hacked. A technician troubleshooting the issue discovers the user used thenumbers ...


A technician would like to remove the dust inside of a desktop computer. Which of the following should thetechnic ...


A company has subscribed to a cloud service, paying monthly for a block of services and being billedincrementally ...


Which of the following Windows utilities would MOST likely be used to identify system errors.


A user frequently travels with a Windows laptop and connects to several wireless networks. At a newlocation, the ...


A technician is noticing extremely slow performance on a computer and would like to see what applicationis consum ...


A user has a new web email account and asks a technician for help with setting up email on a tablet. Theuser woul ...


A technician is installing a wireless network and wants to limit the signal available outside the building.Which ...


A technician needs to install a clean Windows OS on several laptops in the office. The office is running a100Base ...


Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a workPC.


A customer’s Windows 7 Home Premium computer displays a stop error and automatically reboots. Whichof the follo ...


A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliarwebsite. ...


Which of the following Windows OS capabilities allows modern Windows versions to run applicationswritten for olde ...


An administrator must upgrade multiple workstations with a new image being deployed using WindowsDeployment Servi ...


Which of the following would a technician use to search for a specific string within a file name.


Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which ofthe follow ...


A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers andvalidat ...


An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobiledevi ...


An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allowthe ma ...


Which of the following commands are used from a Linux command line interface to elevate a user’s accesslevel to ...


A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1Enterprise ...


A technician is in need of a device that would give the BEST network protection within a single device.Which of t ...


A user needs their email set up on their iOS device. The email needs to synchronize all changes made withthe serv ...


A user needs to connect securely to the company network while working from a hotel room. Which of thefollowing wo ...


A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration.The techn ...


A technician has just upgraded RAM on a user’s workstation from 4GB to 8G


A technician has been informed by the IT security manager that a vulnerability has been discovered in thewireless ...


While navigating a Windows machine through command prompt, which of the following commands will atechnician use t ...


A technician is using a domain account to access files located on a server at the path \computernameC$.The techni ...


A user in a corporate environment needs to have a laptop device repaired and takes the device to theappropriate t ...


A technician is working a trouble ticket for a user. After addressing the issue, the technician asks the userto v ...


A recent data breach has revealed that compromised files contained employee photos, names, andaddresses. This inf ...


An IT manager needs to reimage 30 computers in a lab. The image has already been created and is readyto be deploy ...


A technician has imported a .dll to fix a missing .dll issue on a P


A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologiesshould th ...


A technician is tasked to change the number of CPU cores available to the OS to enhance productivity.Which of the ...


A technician is tasked with removing a virus file that created a custom service. The technician has locatedthe fi ...


The system administrator is tasked with installing Windows to 100 computers over the network. Thesystems administ ...


A technician installs a new application and restarts the computer. After signing in to Windows, an errormessage a ...


A technician is installing Windows 7 on a computer with a previously used hard drive. After receiving anerror, th ...


A computer is displaying a pop up message demanding payment or the hard drive will be encrypted. Which of the f ...


Several users of a shared computer report that Windows often indicates an improper shutdown was experienced upon ...


After confirming BIOS support, technician has added a second video card and a new sound card to a computer&rsquo ...


A computer on a Windows domain has been identified as not having the most current policy. Which of the following ...


A user running Windows 7 has reported that a computer has crashed and a BSOD displayed. The computer was restart ...


A technician needs to repurpose a hard drive that has confidential information on it. Which of the following met ...


A network administrator has moved several users’ folders to a different server. After mapping to the new s ...


A technician is trying to perform a new installation of an operating system on a computer without an optical dri ...


A user wants to reuse a flash drive and ensure that no one can view the previous data. Which of the following is ...


An administrator has verified that a PC has no Internet connectivity. Using ipconfig shows that the IP address f ...


A user tries to login and receives the error message “The User Profile Service failed to login. User Profi ...


A technician is removing malware from a computer in safe mode and is having trouble with one of the infected fil ...


A user starts up a PC and notices it appears to boot from CD or DVD ROM, but after a few seconds continues to b ...


Which of the following is a security best practice.


Which of the following Linux commands is used to configure an Ethernet address.


A technician has cleaned a virus infection off of a PC using corporate approved software. After a short period o ...


A technician is installing a new router at a computer that wants to protect the configuration of the DMZ. To pre ...


A user wants to see the file extensions for all files when navigating the desktop’s file structure. Which ...


A corporate customer has contacted a technician about a database issue. After a reboot, no one can connect to th ...


A technician is installing a private PC in a public workspace. Which of the following password practices should ...


A technician wants to delete all information from a laptop so it is not recoverable, but needs to repurpose the ...


A technician is installing the latest OS on a user’s system. The user wants all of the settings and files ...


To prevent electrical damage to a PC while working on it, which of the following should be disconnected before w ...


A technician is running a Cat 5 cable from the IDF to a user’s PC in the office. Which of the following sh ...


Which of the following is used for building entry and computer access.


Which of the following is a physical device used to prevent tailgating into a facility.


A file is moved from one folder to another within the same disk volume. Which of the following will happen to th ...


A SOHO customer has taken precautions against malware and viruses on a Windows 8 workstation. After implementing ...


A computer repair technician must open a computer case to remove and replace a graphics card. An ESD mat and str ...


An employee was arrested after it was determined that an office computer was used for illegal activity that dama ...


A technician needs to format a new drive on a workstation. The technician will need to configure read attributes ...


An administrator is installing a WAP in a fitness center. There will only be five devices that should have acces ...


A technician wants to change the security level for a set of internal websites accessed frequently by a user. Wh ...


Utilizing login information for social media platforms or email providers without requiring additional credentia ...


Joe, an employee, took a company issued Windows laptop home, but is having trouble connecting to any of the sha ...


A technician wants to decrease the risk of unauthorized users being able to use an unattended computer. Which of ...


A user has become a victim of data harvesting. The user wants to know more about the potential for mobile device ...


As part of a security review at a financial institution, the organization evaluates the potential implementation ...


A technician has been tasked with ensuring all of the company software vulnerabilities are fixed. Which of the f ...


A small business has an open wireless network so vendors can connect to the network without logging in. The busi ...


A novice user is trying to change the password on a Linux system. The user is attempting to use command line fun ...


A new virus has been spreading via USB flash drives when they are plugged in. An administrator has been tasked w ...


A customer has started a cloud initiative and would like to make the log in process to a different application ...


A customer brings in a PC for repair. The technician attentively listens as the customer describes the problem w ...


Which of the following is the proper way to dispose rechargeable batteries.


Which of the following types of attacks is MOST likely to occur if an attacker utilizes an HTTPS proxy.


Which of the following is used to assist developers with programming applications for mobile devices and taking ...


A technician has a requirement to be able to stage several servers on demand and with little notice. The technic ...


After successfully removing malware from a user’s Windows OS PC, a technician confirms the machine had bee ...


A user needs access to files within a shared folder on a Linux server. The user is mapped to the folder but cann ...


A user has installed several applications, which has led to critical OS files being overwritten by files supplie ...


A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that ...


A security team is auditing a company’s network logs and notices that a USB drive was previously inserted ...


A technician is upgrading a computer to Windows 7 Professional 64 bit version. The current OS is Windows Vista ...


Which of the following technologies ensures full device encryption on a Windows mobile device.


A technician is troubleshooting a startup failure on a Windows domain controller DNS service. The technician dis ...


A PC technician issues the following command in a terminal window cat passwd The output of the command is garble ...


A company has drivers with PII and other sensitive information on them. There are several drives that need to be ...


A technician has contacted a vendor, informing them they need to RMA a faulty memory stick. Which of the followi ...


A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even w ...


A home user receives a call from a technician who claims to be with a virus control company. The technician expl ...


A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools ...


The digitizer on a user’s smartphone intermittently stops working. Which of the following is MOST likely t ...


A systems administrator wants to test a tool to enhance productivity but does not want to run it in the live pro ...


A technician is upgrading to a 4TB hard drive and wants to have six partitions. Which of the following allows a ...


Which of the following combinations provides the STRONGEST authentication security.


A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. ...


A user wants to restore an application’s security settings to an iOS device, but an Internet connection is ...


Which of the following statements is true regarding the differences between a 32 bit and 64 bit OS.


Users on the corporate network are reporting that accessing folders is very slow on internal network servers. Wh ...


A coworker asks a technician for help understanding an email request while the technician is on a call assisting ...


A technician in a call center is on a particularly frustrating repair call. Which of the following BEST represen ...


A company wants all new PCs to have a standard sleep and hibernate schedule. Which of the following would allow ...


Joe, an end user, reports that his computer is displaying numerous pop up advertisements and is performing very ...


A user is trying to connect to a new access point with a laptop. The laptop is already able to connect to older ...


A technician has received a call from a user who opened an application and was presented with an error message s ...


A technician responds to a user’s complaint of “stop” errors being received when the user watc ...


A PC technician is configuring IP addresses on a Windows system that has multiple NICs. Which of the following c ...


Which of the following built in accounts removed in Windows 10.


A user has stated a workstation is having problems loading certain websites. The user claims to have clicked on ...


Joe, a user, reports he is unable to install an OS on a home computer. An investigation reveals Joe is using an ...


Multiple users have reported latency issues. After troubleshooting the issue, the technician finds that bandwidt ...


A technician at a corporation receives an instant message from a user who states the new department shared drive ...


A user is experiencing unexpectedly long boot times and abnormally slow performance on a Windows computer. The t ...


A technician is performing an OS upgrade and is provided with an ISO installation file. The customer’s com ...


A user’s computer has detected a S.M.


A user is having difficulty with a recently installed application in Windows 7 and needs to make changes to a co ...


A client reports a laptop does not power on after a lightning storm. The technician diagnoses the problem as bei ...


The general manager installed a popular archive utility. Antivirus software flagged the software because it was ...


Which of the following provide the MOST security for PCs and mobile devices. (Choose two.)


A folder is displayed in green in the tree of the local hard drive. Which of the following would describe what t ...


A technician starts hard drive transfers in a SOHO that will take up to 16 hours to complete. Immediately after ...


A technician creates a GPO, tests it in a test environment, and deploys it company wide. After deployment, the ...


A customer has just experienced a blue screen and the PC will not boot. A technician is dispatched to the custom ...


A user purchases a new Android smartphone. After downloading an application from a third party app store, the u ...


A user’s smartphone is getting a very weak signal from the service provider. One day the user notices the ...


A technician is troubleshooting a PC that has been running slow. The technician looks at the resource utilizatio ...


A company has a web application that is in the cloud on a multi tenant server. The web application is connected ...


A small office owner has asked a technician to ensure all users in the office have the ability to access the wir ...


A technician for an enterprise company is determining the best method to keep the organization’s Windows P ...


A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user stat ...


A technician is troubleshooting an application install on a Linux PC and cannot install the application. Which o ...


The network administrator is investigating latency on a WiFi network. The administrator discovers a number of un ...


A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:


Which of the following is the MAIN reason that corporate policies protect access to PII.


A technician performs an in place upgrade from Windows 7 to 8.1. After the upgrade is complete, a user reports ...


A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the tec ...


An administrator needs to create a new folder on a Windows P


A home user reports the PC is running slow, and pop up advertisements are appearing on screen. The user can acc ...


Which of the following are examples of possession authentication. (Choose three.)


A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when in ...


An employee installed a new application on a shared Windows 10 P


A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there ...


A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is c ...


A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with ...


A client has requested a workspace environment configuration that will allow employees to work in a virtual spac ...


A technician was told that 50 new computers were delivered. The company’s standard Windows image needs to ...


A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from oth ...


A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician ...


A user reports that a cell phone application is loading slowly and not functioning properly. Which of the follow ...


A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer sta ...


A user reports the screen on a mobile device frequently dims even when the device settings are not being changed ...


To implement additional security on a small office wireless network, the administrator disables the DHCP server ...


A user reports personal files have been renamed and are undecipherable. Images have been to the user’s fol ...


A user wants to connect a Windows notebook computer to an external desktop monitor, keyboard, and mouse. However ...


A client wants a technician to create a PC naming convention that will make the client’s PCs easier to tra ...


Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websi ...


A help desk technician receives a call from a user stating a program was installed and now random popups are app ...


Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his p ...


A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on e ...


A technician recently removed a malware infection from a client’s computer. After removing the computer fr ...


When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The t ...


The office of admissions at a university has requested that all staff desktops be replaced with laptops. The sta ...


In Windows 8.1, \E$ is an example of which of the following types of share.


A home server rack is being installed in the computer room and is outfitted with a power distribution block. Whi ...


As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the o ...


When working on a system, Joe, a technician, needs to prevent computer component failure by following a few simp ...


A user has reported that when a document is being edited a pop up appears and locks the workstation. The pop u ...


A technician is configuring settings on a Windows PC and wants to temporarily disable the UAC prompt. Which of t ...


A technician has a single computer that continually shuts down every evening for no apparent reason and must be ...


A technician wants to secure a company’s laptops by preventing the USB flash drive from being used. Which ...


A technician for a large accounting firm is in the process of delivering all assets for retired equipment to a t ...


After completing a fresh Windows 7 installation for a customer, a technician wants to ensure the OS files are hi ...


A mobile device user is concerned about security. The user wants to use multifactor authentication on the device ...


A SOHO user calls a technician and reports that after an on site technician replaced all of the ink cartridges ...


When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs ...


A technician has received new computers to upgrade the marketing department on a large company. The old computer ...


A security administrator is developing workstation hardening standards. As part of the baseline, the administrat ...


Which of the following BEST describes kernel panic.


A team needs to deploy a temporary server room at a site to provide support during construction. Which of the fo ...


A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of th ...


A technician is upgrading the memory on a laptop in the field. The technician has misplaced the ESD strap. Which ...


Which of the following security features is ONLY available in the Windows 7 Enterprise.


A SOHO customer has recently experienced a major hurricane. The customer had no backups and has lost all data an ...


Which of the following Windows Enterprise OS versions offers BitLocker as a feature that can be enabled.


A technician is running a Windows Update on a Windows 7 P


A technician arrives on site to find that two users who have the same model of smartphone are having the same is ...


A technician must remove data from the human resources computers. The technician plans to reuse the drives in th ...


A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have acces ...


A technician wants to set up a virtual machine in a public cloud environment. Which of the following cloud model ...


When synchronizing a cell phone to an Exchange Email Server, which of the following are MOST likely to be synchr ...


Which of the following are only available in Windows Professional versions but not Windows Standard versions. ...


A user needs to replace an open source software package with a commercially licensed package. The user has requ ...


A domain user logs into a computer and notices there are no mapped network drives connected. The network drives ...


A systems administrator wants to take advantage of the benefits of the major cloud providers while retaining som ...


A technician notices a PC displays a missing DLL error message every time on start up. Which of the following to ...


Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe sta ...


A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST ...


Which of the following is an appropriate way to demonstrate professionalism in the workplace.


A user installed a rogue application on a company phone by mistake, causing the phone to overheat. After uninsta ...


A technician has replaced several corporate human resources computers and is asked to ensure the information on ...


A technician needs to disable System Restore prior to a virus cleaning. Which of the following system settings h ...


A user reports an issue with an Internet browser. The browser will not allow certain web pages to be viewed and ...


As part of a regulatory compliance review, an organization determines it must migrate public cloud services, pro ...


A technician identifies a problem on a user’s P


A user just installed a new SOHO wireless router. The user wants to deter casual attempts to access the wireless ...


A technician is configuring a SOHO network of several Windows 7 PCs for a customer. The customer wants to easily ...


A technician receives an end user’s computer that displays erratic behavior upon startup. When the technic ...


An organization has implemented energy efficiency initiatives and wants to maintain the ability to perform late ...


A local administrator wants to perform updates on a user’s Windows 8.1 workstation at regular intervals. B ...


A user reports that CAD drawings are taking an excessive amount of time to load and save. The technician determi ...


A user who works with sensitive data has received a new computer. The user’s old computer is in good condi ...


A technician needs to load several new computers with the company’s customized OS configuration. The techn ...


Which of the following methods BEST ensure data will be inaccessible on a mobile device if it is stolen. (Sele ...


The administrator needs to install Windows 8 on a workstation at a remote location. Which of the following will ...


Ann, a technician, operates a humanitarian relief business that often requires travel to harsh environments with ...


A technician is setting up a computer that will have a hypervisor installed. The technician checks the specifica ...


Which of the following types of security threats is used to attempt to learn a user’s password.


By default, which of the following permissions will take precedence over any other assigned permission on a mapp ...


Which of the following user groups had default administrative permissions in precious versions of Windows, but n ...


A user is receiving unwanted emails when attachments, many of which contain unwanted solicitations. The user&rsq ...


An accountant calls the IT administrator for assistance with a suspicious empty folder named “stuff” ...


A technician is installing new equipment in a server room and notices two data racks and a water sprinkler. Whic ...


A technician is upgrading hard drives on several workstations, however, the office would like to convert the old ...


The IT department is implementing three factor authentication for traveling users who connect to the network vi ...


A user wants to ensure important documents are protected from accidental deletion, system malfunctions, and mali ...


A technician installs new software on a customer’s Windows 8.1 computer and is getting a missing DLL error ...


A user took pictures of a vacation using a new Android smartphone. Family and friends inform the user that some ...


Over the years, a user has been accidentally creating copies of folders in a personal drive and, as a result, th ...


A technician is upgrading the OS of a home PC to Windows 7. The user wants to keep all the files and application ...


A user wishes to install applications on a mobile phone via .apk files loaded on a MicroSD card, rather than dow ...


A security administrator is developing mobile device hardening standards to protect the confidentiality of data. ...


A company located in a metropolitan area is surrounded by different public businesses (e.g. coffee shops, librar ...


Which of the following partition types would be used to create partitions GREATER than 2TB to support the instal ...


A technician is implementing multifactor authentication for a high security organization. Which of the followin ...


Which of the following software typos should a user install on a smartphone if the user does not want communicat ...


A smartphone user who has installed a new augmented reality mobile game reports extremely short battery life on ...


A user brings a personal laptop to the help desk and states that a clicking sound occurs when the laptop is turn ...


An iOS phone can automatically back up data to which of the following.


An electrical fire starts in a PC on a crowded sales floor of an office building. Which of the following is the ...


Joe, an employee, installs his own version of software on a company issued laptop and uses the software for cor ...


A user cannot open an encrypted email on a smartphone and calls the help desk for assistance. Which of the follo ...


A technician is troubleshooting a Windows machine that is unable to boot. Attempts to boot into safe mode result ...


A user has reported that a lab of computes cannot access web based applications. The technician has verified th ...


After a new OS install, a computer continuously reboots. The OS installation was done using a networked imaging ...


Which of the following steps should a technician take to ensure an outside entity cannot introduce malware to th ...


A user’s PC became infected with a virus after the user attempted to open what appeared to be an MP3 file. ...


A Linux system powers on but fails to complete the boot process. Which of the following should be checked FIRST ...


When setting up new Windows PCs in a mixed network environment with Mac OS.X, which of the following file syste ...


A user receives a call from someone who claims to be part of the IT department. The IT caller instructs the user ...


Which of the following is MOST likely a server with an associated MX record.


A user has reported sluggish performance to the help desk. A technician determines the user has been installing ...


A user’s smartphone keeps connecting to WiFi connections. This is a security issue, and the user wants to ...


A technician is dispatched to work on a computer that belonged to a recently terminated employee. The technician ...


A Chief Executive Officer (CEO) needs to back up a Macintosh desktop so all notes are completely secured. Which ...


A customer calls and reports that upon launching the Windows built in calculator application, a UAC dialog appe ...


A technician has installed a server in s SOHO that is in a public area. The office manager wants to ensure only ...


A customer calls the help desk to report an intermittent dim display on a recently purchased laptop that is used ...


While connecting to a coffee shop WiFi, a pop up asks to choose the type of network. The user selects “Pu ...


A technician is attempting to remove all data from a hard drive and make the data unrecoverable. Which of the fo ...


A user needs assistance setting up auto sync on a Windows 8 phone. Which of the following tools is MOST appropr ...


A user has been receiving reply emails from many contacts, but the content of the emails is not familiar and the ...


A Windows user reports that at system startup and when certain programs are launched, a computer displays a mess ...


A user asks a technician to make the icons and fonts larger on a recently issued laptop. Which of the following ...


A user is experiencing a problem with print jobs getting stuck in the queue. The technician attempts to stop the ...