0 of 48 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 48 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.
Which of the following is causing the error?
A user has reported that a computer is running extremely slow when opening applications. A technician
checks the computer and needs to verify memory utilization. Which of the following tools should the
technician use to begin troubleshooting the issue?
A customer is presuming manager to get things done on time. Which of the following has the project failed
to do this case?
A sales representative regularly modifies confidential files on a laptop and needs them to be available all
the time. The sales representative will be on a six-month business trip in two weeks. A technician has been
asked to assist the sales representative with saving files.
Which of the following is the BEST method to implement to prevent any data loss for the sales
Which of the following Windows Enterprise OS version Offers BitLocker as a feature that can be enabled?
A customer’s computer is powered on and working, but the customer is unable to get to any wired network
resources, shared drives, printers, or the Internet. Which of the following command-line tools should be
used to troubleshoot this scenario?
A technician must remove data from the human resources computers. The technician plans to reuse the
drives in the computers.
Which of the following data destruction methods should the technician perform to ensure the data is
Joe. an end user, just changed his network password A pop-up box appears a few minutes later,
prompting him to enter his password. Joe enters his new network password and is able to continue
working. A few minutes later, the same pop- up box appears again, asking him to enter his network
password. Which of the following Control Panel utilities can Joe use to help with this situation?
Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team.
Which of the following documents MUST the technician consider before performing this action?
user’s mobile device is losing its battery charge very quickly. The user reports a 90% charge at 9:00 am,
but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is a relatively
new, high-end phone. The user claims most of the usage involves checking emails for a few minutes three
or four times per hour.
Which of the following should a technician perform FIRST to diagnose the issue properly?
While attempting to install a new program, an end user is notified the workstation meets the memory
requirements, but it does not meet the requirements for free space. Due to time constraints the user needs
a quick way to install and access the program. Which of the following is the BEST option given the
Which of the following NTFS security settings overrides all other settings?
Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the
second support call of the day, Joe realizes the issue will require much more time than initially scheduled,
and several support calls will not be completed. Which of the following would be the appropriate action for
A technician has set up a new computer for a customer and needs to add a login with administrative
Which of the following tools should the technician use?
A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to
test a theory.
Which of the following should the technician use to accomplish this?
Ann. an external user, has received several calls from a company asking why she has been sending the
company communications with internal users’ names in the “from” field. Ann calls a technician and
explains she has not been sending any communications and would like this issue fixed The technician
investigates and determines the PC is not infected with any viruses or malware. Which of the following
should the technician check NEXT?
Which of the following should be enacted to reduce a company’s liability and exposure to a potential lawsuit?
A company has just experienced a data breach that affected all mobile devices.
Which of the following would BEST secure access to user’s mobile devices? (Choose two.)
A user’s computer is running slow even when only one program is open. A technician discovers the CPU is
running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is
MOST likely causing the high resource usage?
A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician
removes the batteries from the UPSs and wants to comply with proper disposal techniques.
Which of the following should the technician do NEXT to proceed with disposal of the batteries?
Which of the following user types should be used in a Windows environment to grant Internet access
without allowing the permanent storage of files on the system?
A customer’s computer is having difficulty opening programs and regularly receives error messages
regarding low system resources. Which of the following performance setting changes would BEST help the
customer temporarily until a proper upgrade can be made?
An employee contacts the help desk because the battery in a company-provided smartphone lasts only a
short period of time when the worker is in the office. Which of the following would MOST likely reduce this
symptom? (Select TWO)
A technician logs on to a Linux computer and runs the following command:
ps -aux | grep vi
Which of the following MOST accurately describes the effect of the command?
A user calls a technician to report loud beeps that are coming from the server room following a recent
rainstorm and power outage. The technician verifies all the servers are online and working properly, and
the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the
A user Is unable to access a network share out can access email. A technician has confirmed the user has
the appropriate permissions to access the share. Which of the following commands should the technician
A technician is investigating an application that has crashed on a workstation. The application is displaying
a generic error.
Which of the following tools should the technician use?
A Linux user report that an application will not open and gives the error only one instance of the application
may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following
pairs of tools will be needed to ensure no other instance of the software are correctly running?
Which of the following types of scripts would be seen on the user end of a web page?
Following an incident, an administrator is gathering forensic evidence from a server for a human resources
Which of the following best practices is MOST important to document throughout the process to maintain
integrity of the findings?
Which of the following is the memory limitation of a 32-bit OS?
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the
old machines, the technician must destroy the data on the HDDs. Which of the following would be the
MOST effective method to accomplish this task?
A technician is repairing a computer.
Which of the following should the technician do to protect the computer from accidental voltage spikes?
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have
protection from physical connection and ensure that employees cannot applications or personal emails.
Which of the following would the technician MOST likely configure on the network device to accommodate
the SOHO user’s request? (Select TWO)
Which of the following is a community supported, open source OS used for both services and workstations?
Which of the following would MOST likely contain troubleshooting guides?
Which of the following BEST describes the Guest account on a Windows system?
A user reports slow performance on a computer. A technician checks the computer and finds the RAM
utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician
discovers a program running in the background Is using most of the RAM. The user only uses this program
once at the end of the year to produce a report. Which of the following steps should the technician take to
improve the computer’s performance?
A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)
A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?
A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user reports that,
after updating the workstation’s graphics driver to a beta version, the machine gives a “Stop” error on every
boot Which of the following should the technician complete to resolve the issue?
A network administrator has noticed unusual activity with a user’s login credentials on the network. The
user is attempting multiple simultaneous login across the network, some of which are attempting to access
workstations and servers to which the user does not have access.
Which of the following should the network administrator do NEXT?
A network administrator recently learned users have been accessing websites that are restricted based on
content by the firewall. To prevent users from circumventing the firewall rules, which of the following
Windows settings should the administrator locks to prevent them from being changed?
Joe. a technician, receives notification that a share for production data files on the network Is encrypted.
Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments
have access. He then searches the user directories of those departmental users who are looking for
encrypted files. He narrows his search to a single user’s computer. Once the suspected source of the virus
is discovered and removed from the network, which of the following should Joe do NEXT?
Which of the following encryption methods is used by WPA2 to improve data security as compared to
previous wireless encryption protocols?
A user’s computer reports it has many virus infections and directs the user to call a phone number for
assistance. A technician removes the hard drive and virus scans the drive with another computer. The
scan does not identify any viruses Which of the following is MOST likely the problem?
Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus,
but it registers In the correct spool when she her finger. Which of the following would be the BEST
resolution to issue?