220-1102
Free trial
Verified
Question 1
SIMULATION -
Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect to the wireless network. Other users have reported that their personal devices are connecting without issues. She has asked you to assist with getting the device online without adjusting her home WiFi configuration.
INSTRUCTIONS -
Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Question 2
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
- A: Run a startup script that removes files by name.
- B: Provide a sample to the antivirus vendor.
- C: Manually check each machine.
- D: Monitor outbound network traffic.
Question 3
A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?
- A: Put on an ESD strap.
- B: Disconnect the power before servicing the PC.
- C: Place the PC on a grounded work bench.
- D: Place components on an ESD mat.
Question 4
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal?
- A: Security and Maintenance
- B: Network and Sharing Center
- C: Windows Defender Firewall
- D: Internet Options
Question 5
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
- A: RDP through RD Gateway
- B: Apple Remote Desktop
- C: SSH access with SSH keys
- D: VNC with username and password
Question 6
Which of the following is an example of MFA?
- A: Fingerprint scan and retina scan
- B: Password and PIN
- C: Username and password
- D: Smart card and password
Question 7
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
- A: Bridge the LAN connection between the laptop and the desktop.
- B: Set the laptop configuration to DHCP to prevent conflicts.
- C: Remove the static IP configuration from the desktop.
- D: Replace the network card in the laptop, as it may be defective.
Question 8
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.
Which of the following should a technician do to remediate the issue?
- A: Roll back the updates.
- B: Increase the page file.
- C: Update the drivers.
- D: Rebuild the profile.
Question 9
Which of the following is the MOST basic version of Windows that includes BitLocker?
- A: Home
- B: Pro
- C: Enterprise
- D: Pro for Workstations
Question 10
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?
- A: Run the virus scanner in an administrative mode.
- B: Reinstall the operating system.
- C: Reboot the system in safe mode and rescan.
- D: Manually delete the infected files.
Question 11
A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?
- A: Installer_x64.exe
- B: Installer_Files.zip
- C: Installer_32.msi
- D: Installer_x86.exe
- E: Installer_Win10Enterprise.dmg
Question 12
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email.
The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?
- A: Advise the user to run a complete system scan using the OS anti-malware application.
- B: Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present.
- C: Have the user check for recently installed applications and outline those installed since the link in the email was clicked.
- D: Instruct the user to disconnect the Ethernet connection to the corporate network.
Question 13
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?
- A: Keyboard
- B: Touch pad
- C: Ease of Access Center
- D: Display settings
Question 14
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?
- A: PIN-based login
- B: Quarterly password changes
- C: Hard drive encryption
- D: A physical laptop lock
Question 15
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?
- A: Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
- B: Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
- C: Delete the microphone from Device Manager and scan for new hardware.
- D: Replace the USB microphone with one that uses a traditional 3.5mm plug.
Question 16
A user who is unable to connect to the network submits a help desk ticket. The assigned help desk technician inquires about whether any recent changes have been made. The user reports there is construction activity in the surrounding offices. The help desk technician proceeds to ping the user's desktop, which does not respond. Which of the following is the MOST likely cause of this issue?
- A: A duplicate IP address has been issued to the user's desktop.
- B: The HDD of the OS is failing.
- C: The network cable has become disconnected.
- D: Malware has infected the system.
Question 17
A user has been unable to access a website and has submitted a help desk ticket. The website has been verified to be online. Which of the following troubleshooting steps will MOST likely resolve the issue?
- A: Deleting the browser history
- B: Clearing the cache
- C: Enabling private mode browsing
- D: Enabling ad blocking
Question 18
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro. The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?
- A: Golden image
- B: Remote network install
- C: In-place upgrade
- D: Clean install
Question 19
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?
- A: Requiring strong passwords
- B: Disabling cached credentials
- C: Requiring MFA to sign on
- D: Enabling BitLocker on all hard drives
Question 20
A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?
- A: WPS
- B: TKIP
- C: WPA3
- D: WEP
Question 21
After returning from vacation, a user is unable to connect to the network at the corporate office. Windows allows the user to log in; however, no internal or external websites are accessible when running a browser. The user's expected network shares are unreachable, and all websites attempted return the message, Hmm, we can't reach this page. Which of the following is the MOST likely cause of this issue?
- A: The user's password expired while on vacation.
- B: The user clicked on a malicious email.
- C: The user connected to a captive portal while traveling.
- D: The user enabled airplane mode.
Question 22
Which of the following file extensions are commonly used to install applications on a macOS machine? (Choose three.)
- A: .mac
- B: .pkg
- C: .deb
- D: .dmg
- E: .msi
- F: .appx
- G: .app
- H: .apk
Question 23
A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?
- A: Services in Control Panel to check for overutilization
- B: Performance Monitor to check for resource utilization
- C: System File Checker to check for modified Windows files
- D: Event Viewer to identify errors
Question 24
A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?
- A: Enable multifactor authentication.
- B: Increase the failed log-in threshold.
- C: Remove complex password requirements.
- D: Implement a single sign-on with biometrics.
Question 25
A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?
- A: The SNTP server is offline.
- B: A user changed the time zone on a local machine.
- C: The Group Policy setting has disrupted domain authentication on the system.
- D: The workstations and the authentication server have a system clock difference.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!