Which of the following installation types is used to install an operating system from an image on a network server using PXE or NetBoot?
A)
... [Show More] Unattended
B) Remote network
C) Multiboot
D) Image deployment - ✔✔ Remote network
Which of the following is a probable cause of irregular wireless connectivity in mobile devices?
A) Items blocking the signal between the device and a wireless access point.
B) Broadcast settings have been misconfigured on the device.
C) A failure in the network card or antenna.
D) Wireless networking has been turned off. - ✔✔ Items blocking the signal between the device and a wireless access point
Which utility shows a log of application and system messages, including errors, information messages, and warnings?
A) System Restore
B) Action Center
C) Event Viewer
D) Network and Sharing Center - ✔✔ Event Viewer
Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder?
A) Modify
B) List Folder Contents
C) Read & Execute
D) Write - ✔✔ Modify
Which of the following can hold digital certificates, store temporary data, or even perform cryptographic processing functions to keep its data secure?
A) Magnetic stripe card
B) SSO
C) SLA
D) Smart card - ✔✔ Smart card
Joe, a technician in an organization, is asked to scan and repair a mobile device which has been affected by malware. In order to repair the device completely from malware, he has to put the device back again to its fresh state. Which of the following tools will Joe use to repair the mobile device?
A) Backup and restore
B) Factory resets
C) Antimalware
D) App scanner - ✔✔ Factory resets
Which is an attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content?
A) Tailgating
B) Spam
C) Shoulder surfing
D) Spoofing - ✔✔ Spam
Which of the following environment variables is used to access the absolute file path of the Windows system folder?
A) %SystemRoot%
B) %APPDATA%
C) %CD%
D) %TEMP% - ✔✔ %SystemRoot%
Which of the following is the legal contract between a licenser and purchaser to govern and establish the purchaser's right to use a software?
A) MDM
B) DRM
C) EULA
D) MMC - ✔✔ EULA
Which of the following statements are true about the homegroup sharing model?
Each correct answer represents a complete solution. Choose all that apply.
A) Home and business editions of Windows can join homegroups.
B) Computers on a homegroup has its own list of user accounts, called local accounts.
C) Homegroups are created by one user and can be joined by anyone with a shared password.
D) Computers in domains can join homegroups, but not create them. - ✔✔ Home and business editions of Windows can join homegroups.
Homegroups are created by one user and can be joined by anyone with a shared password.
Computers in domains can join homegroups, but not create them.
Which of the following ways writes zeros to the entire drive and restores the drive to its newly installed configuration?
A) HDShredder
B) Secure deletion program
C) Low-level format
D) SSD - ✔✔ Low-level format
Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup?
A) Action Center
B) UAC
C) Event Viewer
D) MSConfig - ✔✔ MSConfig
Henry, a customer, calls you to explain an issue with his computer and expressed anger about the service provided by your company. What guidelines should you follow while dealing with the customer?
Each correct answer represents a complete solution. Choose all that apply.
A) Avoid being judgemental.
B) Dismiss irrelevant problems.
C) Do not argue or become defensive.
D) Ask open-ended questions. - ✔✔ Avoid being judgemental.
Do not argue or become defensive.
Ask open-ended questions.
You have created a script file that runs in the Windows Command Prompt environment (CMD.EXE) or in its DOS-based predecessors. What is the extension of this script file?
A) .bat
B) .sh
C) .ps1
D) .vbs - ✔✔ .bat
Which of the following commands can be used to manage network shares, network print jobs, and network users?
A) ping
B) net
C) ipconfig
D) tracert - ✔✔ net
Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space?
A) Mechanical blowers
B) Air filters
C) Air masks
D) Enclosures - ✔✔ Enclosures
Which of the following encryption systems is included with the Business/Professional/Enterprise/Ultimate editions of Windows as well as all editions of Windows Server?
A) Encrypting File System
B) NT File System
C) BitLocker-To-Go
D) BitLocker - ✔✔ Encrypting File System
You are a technician in an organization. You are working on a computer system. Suddenly, you felt an electric shock while operating it. You don't have an electrostatic discharge (ESD) device to protect your system. Which of the following will you use in this situation?
A) Wrist strap
B) Electrically grounded mat
C) Self-grounding
D) Antistatic bag - ✔✔ Self-grounding
Which is a particularly intrusive sort of malware that attempts to extort money from the victim in order to undo or prevent further damage?
A) Spyware
B) Adware
C) Ransomware
D) Rootkit - ✔✔ Ransomware
You are a network administrator of an organization. You have been given a task to maintain the right and healthy environment for the electronic equipment in the server room. What environmental guidelines should you follow?
Each correct answer represents a complete solution. Choose all that apply.
A) A well ventilated HVAC system should be used to dissipate heat.
B) Temperatures should not fluctuate much between 65 to 85 degrees.
C) Good ventilation and proper air flow should be maintained.
D) Humidity should be below 30% to 40% in the server room. - ✔✔ A well ventilated HVAC system should be used to dissipate heat.
Temperatures should not fluctuate much between 65 to 85 degrees.
Good ventilation and proper air flow should be maintained.
You are a support specialist in a company. While servicing a computer at a customer's location, you notice a file containing some private and confidential information of the customer. What should you do to deal appropriately with the confidential and private file?
A) Inform your company members about the file.
B) Open and examine the file.
C) Share the content of file on social media.
D) Keep the file confidential and secure. - ✔✔ Keep the file confidential and secure [Show Less]