Thomas, a user, reports that his mobile device is not working properly. When you research the issue, you discover that he accidentally deleted all the data... [Show More] of his device. What has most likely occurred on his mobile device?
Each correct answer represents a complete solution. Choose all that apply.
A) Adjust device settings.
B) Perform a soft reset.
C) Perform a hard reset.
D) Perform a factory reset. - ✔✔ Perform a hard reset
Perform a factory reset
You receive a call from the customer. Your radio is on and you are in the process of eating your lunch. What should you do?
A) Transfer the customer's call to a co-worker.
B) Get the customer's contact information and call them back later.
C) Turn off your radio, stop eating, and listen to your customer.
D) Continue what you are doing while talking to the customer. - ✔✔ Turn off your radio, stop eating, and listen to your customer
Thomas, a technician, has the company's iPad that will be used for storing private data and photos of clients. He needs to protect the integrity of the data on this device. What should he do?
Each correct answer represents a complete solution. Choose two.
A) Turn on Touch ID & Passcode.
B) Turn on Bluetooth.
C) Turn on WiFi.
D) Turn on Find My iPhone in Settings. - ✔✔ Turn on Touch ID & Passcode
Turn on Find My iPhone in Settings
Which of the following is a bandwidth-optimization feature intended to keep central data to remote or branch offices in order to reduce the network traffic?
A) BranchCache
B) BitLocker
C) RDP host
D) EFS - ✔✔ BranchCache
Which of the following logs can be viewed using the Event Viewer tool in Windows 8.1 computers?
Each correct answer represents a complete solution. Choose all that apply.
A) Security log
B) System log
C) Application log
D) Data log - ✔✔ Security log
System log
Application log
James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local files and write extended attributes to specific folders. Which of the following file systems will allow him to configure these settings in a Windows environment?
A) HFS
B) NTFS
C) FAT32
D) EXT4 - ✔✔ NTFS
A customer's Windows based computer is not connecting to a website. Which of the following utilities will permit the technician to view the route of hops between the host and remote systems?
A) tracert
B) nslookup
C) netstat
D) ping - ✔✔ tracert
Andrew, a technician, is trying to manually migrate a user's profile from one Windows PC to another. Files in the user's folder cannot be copied. Which of the following file systems is causing this to occur?
A) CDFS
B) EFS
C) exFAT
D) NFS - ✔✔ EFS
Which of the following is a collection of articles that serves as a first line of customer support, helping the customers to educate themselves about the products and services and ideally solve their own problems before calling the help desk?
A) Incident documentation
B) Knowledge base
C) Safety plan
D) Inventory management - ✔✔ Knowledge base
A type of security threat that uses computers or other networks to accept and pass on viruses is called:
A) man-in-the-middle.
B) logic bomb.
C) botnets.
D) phishing. - ✔✔ botnets
There are 20 laptops in a room and they all need to connect wirelessly to the network. Which of the following would be the best device to use?
A) Hub
B) Switch
C) WAP
D) Router - ✔✔ WAP
You want to shrink the partition size of a hard drive. Which of the following is the best choice to modify the size of the partition?
A) Computer Management
B) Device Manager
C) Windows Memory Diagnostics
D) Local Users and Groups - ✔✔ Computer Management
Which is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise?
A) Tailgating
B) Spamming
C) Dumpster diving
D) Phishing - ✔✔ Tailgating
You have been assigned a task to troubleshoot a user's problem. When you arrive, you notice that a spreadsheet that contains confidential employee information is open on the user's computer. What should you do?
A) Leave the spreadsheet alone as long as the user is present.
B) Close the spreadsheet.
C) Ask the user to close the spreadsheet.
D) Minimize the spreadsheet. - ✔✔ Ask the user to close the spreadsheet
Jennifer, a user, has a brand new iPhone that she thinks is defective because it keeps losing battery power. What are three easy fixes she can do herself without having to take it in for technical service?
Each correct answer represents a complete solution. Choose all that apply.
A Turn on WiFi.
B Close the background apps.
C Dim the display.
D Turn on Bluetooth.
E Turn on Airplane mode. - ✔✔ Close the background apps
Dim the display
Turn on Airplane mode
Which of the following should you use for destroying data on magnetic media like tapes and hard drives, but not optical or flash storage?
A) An electromagnetic degausser
B) A data destruction service which provides certificate of destruction
C) An industrial shredder
D) A hammer and drill - ✔✔ An electromagnetic degausser
You work as a network administrator in a company. A user has brought it to your attention that some malicious looking icons have appeared on his PC. You've quarantined the infected system. Which of the following steps will you perform next to resolve this issue?
A) Educate end users.
B) Disable system restore.
C) Schedule scans and updates.
D) Remediate infected systems. - ✔✔ Disable system restore
Which of the following Linux commands allows users to run programs with the security privileges of the root user?
A) diff
B) chown
C) apt-get
D) sudo - ✔✔ sudo
Which of the following is used to classify and protect the confidential and critical data of the organization?
A) NIDS
B) DLP
C) HIPS
D) HIDS - ✔✔ DLP
Which of the following are the requirements of a strong password policy?
Each correct answer represents a complete solution. Choose all that apply.
A) Passwords are multi-factor which can be easily compromised, so secure accounts should augment them with single factor authentication.
B) Passwords should be easy for the user to remember, but difficult for an attacker to guess.
C) Passwords should never be shared between users or given to unauthorized people.
D) Password should be changed if there's any doubt that it is known to someone. - ✔✔ Passwords should be easy for the user to remember, but difficult for an attacker to guess
Passwords should never be shared between users or given to unauthorized people
Password should be changed if there's any doubt that it is known to someone
Which of the following Linux commands allows you to perform search actions, such as finding any instance you're searching for, in a file?
A) whoami
B) chown
C) grep
D) dd - ✔✔ grep
You've assigned a task to give limited computer access to individuals without a user account. Which of the following accounts will you create?
A) Administrator
B) Guest
C) Standard User
D) Power User - ✔✔ Guest
You have just downloaded a game onto your laptop. When you are not using the device, it unexpectedly downloads new content. Which of the following is the most likely cause of this issue?
A) Ransomware
B) Logic bomb
C) Spam
D) Trojan horse - ✔✔ Trojan horse [Show Less]