Check answers here:
IT Essentials (Version 8.0) A+ Cert Practice Exam 2 Answers
Quiz-summary
0 of 172 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
Information
good luck for you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 172 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- Answered
- Review
-
Question 1 of 172
1. Question
1 pointsA server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?Correct
Incorrect
Hint
RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well. -
Question 2 of 172
2. Question
1 pointsA user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?Correct
Incorrect
Hint
The virtual machines work separately from the host operating systems, even though they use the same system resources. The weaknesses and vulnerabilities from one virtual machine are not spread to other virtual machines or the host operating system. -
Question 3 of 172
3. Question
1 pointsWhich fire protection system would be best for a university computer/electronics lab?Correct
Incorrect
-
Question 4 of 172
4. Question
1 pointsWhy should a technician avoid opening the casing of a power supply?Correct
Incorrect
Hint
Power supplies contain high voltage, and only highly-trained technicians should attempt to repair them. A power supply can still hold dangerous levels of electricity even after being disconnected from the mains power. -
Question 5 of 172
5. Question
1 pointsWhat is the first step a technician should take when preparing to work on the inside of a computer?Correct
Incorrect
Hint
Before any service inside a computer is performed, the PC should be turned off and disconnected from any source of power to reduce the risk of shock. -
Question 6 of 172
6. Question
1 pointsWhat tool can be used to find and attempt to fix file structural errors on a hard disk in Windows 7?Correct
Incorrect
Hint
Chkdsk attempts to correct file structural errors. Format is used to prepare a storage deviceso that it may store data. System file checker (sfc) replaces corrupt operating system files. Remove directory (rd) is used to delete a directory from the file structure. -
Question 7 of 172
7. Question
1 pointsA customer asks for a solution to a printer problem that is beyond the knowledge level of the technician. What should the technician do?Correct
Incorrect
Hint
Trying to fix a problem that is beyond the knowledge level of the technician may create additional problems. -
Question 8 of 172
8. Question
1 pointsWhich statement that is related to running 64-bit software is correct?Correct
Incorrect
Hint
32-bit software can run on a 64-bit processor running a 64-bit operating system. 64-bit software can only run on a 64-bit processor running a 64-bit operating system. -
Question 9 of 172
9. Question
1 pointsWhich statement is correct about installing a 32-bit operating system on a x64 architecture?Correct
Incorrect
Hint
A 32-bit operating system can run on a x64 architecture, but it will not be able to use more than 4 GB of the system memory. A 64-bit OS includes features that provide additional security. -
Question 10 of 172
10. Question
1 pointsWhat action should a technician take before upgrading computers from Vista to Windows 7?Correct
Incorrect
Hint
When an upgrade from Vista to Windows 7 is being planned, the first step is to download and run the Windows 7 Upgrade advisor. It is not necessary in that situation to uninstall all programs or to upgrade the video card, as the requirements are the same for the two operating systems. -
Question 11 of 172
11. Question
1 pointsWhat is a possible situation when it might be necessary to boot Windows 7 from a USB device, a CD, or a DVD?Correct
Incorrect
Hint
Disabling background services, deleting registry keys, and partitioning the hard drive do not require rebooting a PC. It might be necessary to boot a computer from a USB drive in order to repair the system in some situations. -
Question 12 of 172
12. Question
1 pointsWhat type of partition has the ability to create volumes spanning across more than one disk?Correct
Incorrect
Hint
The primary partition contains the operating system files and is usually the first partition. The OS uses the active partition to boot the computer. The extended partition normally uses the remaining free space on a hard drive or takes the place of a primary partition. A dynamic partition is the only type of partition that allows creating volumes spanning over more than one disk. -
Question 13 of 172
13. Question
1 pointsWhat type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?Correct
Incorrect
Hint
The file system exFAT, also known as FAT64, is used to address some of the shortcoming of FAT32 and is mainly used for USB flash drives. CDFS is used for optical drives. FAT32 allows the storage of files up to 4 GB in size. NTFS allows the storage of files up to 16 TB in size. -
Question 14 of 172
14. Question
1 pointsWhich user account should be used only to perform system management and not as the account for regular use?Correct
Incorrect
Hint
The administrator account is used to manage the computer and is very powerful. Best practices recommend that it be used only when it is needed to avoid accidentally performing significant changes to the system. -
Question 15 of 172
15. Question
1 pointsWhich type of user account is created automatically during a Windows 8.1 installation?Correct
Incorrect
Hint
During a Windows 8.1 installation the Administrator account is created automatically. All other accounts have to be created manually. -
Question 16 of 172
16. Question
1 pointsA technician is attempting to repair a Windows 7 laptop that has a missing or corrupt OS file that prevents Windows 7 from starting up. The technician reboots the laptop and accesses the WinRE via the F8 key. Which option must the technician choose in the System Recovery menu to locate and fix the missing or corrupt system files?Correct
Incorrect
Hint
Startup Repair will scan the hard drive and identify and fix any missing or corrupt OS files. WinRE options can also be accessed by booting from the installation media or a system repair disk. -
Question 17 of 172
17. Question
1 pointsWhen would the PXE option be used when repairing a PC?Correct
Incorrect
Hint
The Preboot eXecution Environment (PXE, but pronounced pixie) BIOS boot option is used to install an operating system from a remote network location. -
Question 18 of 172
18. Question
1 pointsA user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?Correct
Incorrect
Hint
A partition must be formatted with the NTFS file system in order to extend it by using the unallocated space on the disk. Once the partition has been extended, the disk type must be converted to a dynamic disk in order for the new partition to be accessible. -
Question 19 of 172
19. Question
1 pointsA user is viewing the Windows Disk Management utility and notices that one of the disks is marked as Foreign. What does this mean?Correct
Incorrect
Hint
When a dynamic disk is removed from another Windows PC and installed onto the current PC, the disk manager will note this and mark it as Foreign within the Disk Management utility. -
Question 20 of 172
20. Question
1 pointsWhat are two file attributes in the Windows environment? (Choose two.)Correct
Incorrect
Hint
The file attributes are read-only, archive, hidden, and system. Details, security, and general are tabs on the file Properties applet. -
Question 21 of 172
21. Question
1 pointsWhat are two functions of hypervisors? (Choose two.)Correct
Incorrect
Hint
The hypervisor does not protect the hosting OS from malware. Neither does it allow sharing software across virtual machines. The hard drive of the supporting computer does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them. -
Question 22 of 172
22. Question
1 pointsWhich Windows utility can be used to schedule a regular backup for preventive maintenance?Correct
Incorrect
Hint
Windows Task Scheduler is a tool that helps scheduling repetitive tasks, such as backups, antivirus scans, and more. -
Question 23 of 172
23. Question
1 pointsWhich statement is correct about applying firmware updates?Correct
Incorrect
Hint
Firmware updates can make the hardware unusable if not performed correctly. Sometimes it is not possible to revert to the original firmware once the update has been performed because of how the changes are applied to the EPROM technology. -
Question 24 of 172
24. Question
1 pointsWhat is true about restore points?Correct
Incorrect
Hint
Any change from a system restore is reversible. A restore point only contains information about the system and registry settings and therefore cannot be used to backup or recover data files. -
Question 25 of 172
25. Question
1 pointsA user has a computer that is infected with spyware. What should be performed before removing the spyware?Correct
Incorrect
Hint
An infected computer that performs a system restore will save the virus or spyware along with the restore point. Therefore, system restore files must be deleted before the removal of malware. -
Question 26 of 172
26. Question
1 pointsA technician is troubleshooting a Windows 7 laptop that takes significantly longer than expected when performing a file search. What is the possible cause?Correct
Incorrect
Hint
The Windows indexing service is used to speed up file searches. A slow search may be the result of either the index service not running or not indexing the correct location. -
Question 27 of 172
27. Question
1 pointsA user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure?Correct
Incorrect
Hint
Backing up important files is the first step in protecting existing data. After backing up, running chkdsk will allow the technician to determine if there are bad sectors on the hard drive, without losing any data. -
Question 28 of 172
28. Question
1 pointsA user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?Correct
Incorrect
Hint
The functions of the listed commands are as follows: runas – runs a program or tool with different permissions rstrui – starts the System Restore utility gpresult – displays group policy settings gpupdate – refreshes group policy settings tasklist – displays currently running applications -
Question 29 of 172
29. Question
1 pointsA company has recently deployed Active Directory and now a workstation cannot connect to a network resource. A technician takes corrective action by modifying group policy settings. Which command should the technician use to make the workstation synchronize with the new settings?Correct
Incorrect
Hint
The functions of the listed commands are as follows: runas – runs a program or tool with different permissions rstrui – starts the System Restore utility gpresult – displays group policy settings gpupdate – refreshes group policy settings tasklist – displays currently running applications -
Question 30 of 172
30. Question
1 pointsA wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)Correct
Incorrect
Hint
Disabling DHCP and assigning static IP addresses only to authorized devices will prevent unauthorized devices from automatically obtaining IP address information. Without the correct IP address information, the unauthorized devices will not be able to communicate over the network. Disabling DNS will result in all connected devices no longer automatically being able to communicate with network resources by name (IP addresses would have to be used.), but will not prevent unauthorized devices from connecting and enabling potentially malicious access from occurring. Subnetting the network will change the range of IP addresses used but not prevent unauthorized network access. Disabling SSID broadcasts is only applicable to wireless networks, not wired networks. -
Question 31 of 172
31. Question
1 pointsRefer to the exhibit. In what situation would a technician use this tab?Correct
Incorrect
Hint
The Alternate Configuration tab allows a device to have two IP configurations. One configuration might set the network card to DCHP using the General tab and then configure a static IP address for the home network using the Alternate Configuration tab. -
Question 32 of 172
32. Question
1 pointsOn a PC that is running Windows 7 Ultimate, a user sets up a home entertainment system and creates a homegroup. The user then joins two other PCs to the workgroup, one PC running Windows 7 Starter and the other running Windows 7 Home Basic. What else must the user do in order to have the user accounts on the Windows 7 Home Basic and Windows 7 Starter PCs access the shares on the home entertainment system?Correct
Incorrect
Hint
When Windows 7 PCs join a homegroup all user accounts on all the PCs are added to the homegroup. Windows 7 Starter and Windows 7 Home Basic PCs can join the homegroup but cannot be used to create a homegroup. -
Question 33 of 172
33. Question
1 pointsA user is reporting that a file has been shared specifically with another user on the network, but the other user opens the file and is unable to save it once edited. What is the probable cause?Correct
Incorrect
Hint
The permission setting should have been Change or Full Control. The Read permission does not allow edited files to be saved. -
Question 34 of 172
34. Question
1 pointsWhich character of the Cloud model provides easy monitoring, controlling, reporting, and billing for both the provider and customers?Correct
Incorrect
Hint
With measured service of the Cloud model, the resource usage can be easily monitored, controlled, reported, and billed to provide full visibility to both the Cloud service provider and customers. -
Question 35 of 172
35. Question
1 pointsA business organization is configuring security on the mobile devices that are used in the organization. The security policy states that business data on mobile devices should only ever be accessed by employees. Which mobile device security feature can be used to best ensure that business data is rendered completely inaccessible if the device is lost or stolen?Correct
Incorrect
Hint
Remote wipe is a security feature that remotely clears the device of all user data to prevent it from being maliciously compromised. Remote lock and the user passcode lock features on mobile devices can help prevent theft of private information but the data remains on the device and may be accessed if the passcode is ever broken. Sandbox describes the running of mobile apps separate from the operating system. -
Question 36 of 172
36. Question
1 pointsAn administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could cause this situation? (Choose two.)Correct
Incorrect
Hint
Both Apple and Google release their own software development kits (SDKs) that allow developers to create apps for iOS and Android mobile devices. Developers can run the SDK and create apps on a simulator. SLA is an agreement between a service provider and customers. -
Question 37 of 172
37. Question
1 pointsWhat is needed from Apple and Google in order for individual programmers to develop apps for iOS and Android devices?Correct
Incorrect
-
Question 38 of 172
38. Question
1 pointsWhich type of malware is disguised as a legitimate program?Correct
Incorrect
Hint
Trojan horses disguise themselves as legitimate programs. Worms replicate themselves across a network. Adware may attach to a legitimate program, but does not disguise itself. Spyware monitors the activities of a user. -
Question 39 of 172
39. Question
1 pointsAfter complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?Correct
Incorrect
Hint
The source of the problem cannot be a virus because in this situation the server is passive and at the receiving end of the attack. A replay attack uses intercepted and recorded data in an attempt to gain access to an unauthorized server. This type of attack does not involve multiple computers. The issue is not the bandwidth available, but the number of TCP connections taking place. Receiving a large number of connections from multiple locations is the main symptom of a distributed denial of service attack which use botnets or zombie computers. -
Question 40 of 172
40. Question
1 pointsWhich security threat hides the resources that it uses from antivirus programs?Correct
Incorrect
Hint
Rootkits target a known vulnerability to gain administrator-level access. This gives the rootkit the ability to hide itself. Trojans, worms, and spyware do not gain administrator level access. -
Question 41 of 172
41. Question
1 pointsA user receives an email requesting verification of the password that is used to access bank files. What type of security threat is this?Correct
Incorrect
Hint
Phishing is a form of attack that starts with the attacker pretending to be a legitimate entity and then tries to gather information that can be used to conduct the exploit. -
Question 42 of 172
42. Question
1 pointsA cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?Correct
Incorrect
Hint
Social engineering is when a person attempts to manipulate another individual to gain access to information or resources to which they are not entitled. -
Question 43 of 172
43. Question
1 pointsWhich two precautions can help prevent social engineering? (Choose two.)Correct
Incorrect
Hint
Asking for IDs and escorting visitors are effective ways to prevent social engineering. Users should never keep their passwords in the work area. Eliminating customers is not always practical for business purposes. -
Question 44 of 172
44. Question
1 pointsA company has replaced five desktop computers in the accounting and finance department with new computers. The plan is to donate the recovered computers in a fully functional state to a not-for-profit community organization. How can the company ensure that sensitive financial data cannot be accessed once the computers are donated?Correct
Incorrect
Hint
Data wiping the hard drives with software that will securely erase all data will ensure that company data cannot later be accessed. This may be time consuming but for a small number of computers this is more cost-effective than the expense of degaussing. Deleting all the files and directories on the hard drives or performing a high-level format on each drive will leave the computers vulnerable to having the company data recovered by specific forensic software. Drilling holes in the hard drive platters would mean that the computers are no longer in working condition. -
Question 45 of 172
45. Question
1 pointsMatch the task to the Windows Control Panel utility. (Not all options are used.)Correct
Incorrect
-
Question 46 of 172
46. Question
1 pointsMatch the task to the Windows 10 Control Panel utility. (Not all options are used.)Correct
Incorrect
-
Question 47 of 172
47. Question
1 pointsMatch the scripting language with the script file name extension. (Not all options are used.)Correct
Incorrect
Hint
Linux Shell Script is .sh Linux Shell Script uses a file extension of .sh. Windows Batch File uses a file extension of .bat. PowerShell uses a file extension of .ps1. Python uses a file extension of .py. JavaScript uses a file extension of .js. VBScript uses a file extension of .vbs. -
Question 48 of 172
48. Question
1 pointsMatch the file system term used in Linux to the function.Correct
Incorrect
Hint
The certification objectives list the words “swap file system” as a term to be defined as it relates to the Linux file system. Swap space, swap file, or swap partition are other words for describing hard drive space that is used when the system needs more memory than there is RAM.- supports increased file sizes –> ext4
- minimizes file corruption risk in the event of power loss –> journaling
- provides hard drive space that holds inactive RAM content –> swap file system
- stores information about how the file system is organized –> MBR
-
Question 49 of 172
49. Question
1 pointsWhich two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)Correct
Incorrect
Hint
Persistent data is data stored on an internal or external hard drive, or an optical drive. Data is preserved when the computer is turned off. -
Question 50 of 172
50. Question
1 pointsOn which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)Correct
Incorrect
-
Question 51 of 172
51. Question
1 pointsWhich three items are biometric security devices? (Choose three.)Correct
Incorrect
Hint
Fingerprint readers, retina scanners, and voice recognition are all biometric devices, comparing physical characteristics of the user to stored data to authenticate the user. Smart cards, key fobs, and passwords are all security measures, but do not rely on biometrics. -
Question 52 of 172
52. Question
1 pointsWhich two guidelines are appropriate for creating strong passwords? (Choose two.)Correct
Incorrect
Hint
Strong passwords should be at least eight characters, and should include upper and lower case letters, numbers, and symbols. Although passwords should be changed regularly as specified in the local security policy, the amount of time between changes has no effect on the creation of strong passwords. Limiting a password to only symbols, or to only numbers and upper case letters, does not provide the strongest password possible. -
Question 53 of 172
53. Question
1 pointsA support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)Correct
Incorrect
Hint
Angry customers should be allowed to explain the problem, then be redirected to discussing how the problem can be solved. Transferring the customer, replying in a rude tone, and asking unrelated questions will usually increase, not ease, the anger being expressed by the customer. -
Question 54 of 172
54. Question
1 pointsA technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)Correct
Incorrect
Hint
The initial reason for accessing the computer, the suspected illegal matter or operations, and the location of the computer are immediately apparent to the technician and should be among the first details documented. Details of past computer users and the duration of the illegal activity are matters that the appropriate investigators will determine. The technical specifications of the computer may have little relevance to its illegal use. -
Question 55 of 172
55. Question
1 pointsWhat two roles or tasks are associated with level two technicians? (Choose two.)Correct
Incorrect
Hint
Level two technicians are primarily tasked with receiving and working on escalated work orders. Their tasks involve using remote access software to connect to the computer of a customer to perform maintenance and fixes. -
Question 56 of 172
56. Question
1 pointsA store in a shopping center uses a wireless network to provide internet access for three tablet computers. The authentication to the wireless router has been configured as 128-bit WEP. Recently the store employees notice that the internet connection is getting slower. The network administrator of the shopping center reviews the logs of the wireless router and notices many non-store devices are associated with the router. Which two actions can the network administrator do to improve the security of the wireless network access? (Choose two.)Correct
Incorrect
Hint
The SSID is used to identify the wireless LAN and should not be considered a method for securing the WLAN. WEP encryption is weak and prone to attacks with wireless hacking tools. WEP should not be used and has been replaced by the much more secure WPA2 protocol. MAC address filtering can ensure that only authorized devices can be associated with the wireless router. -
Question 57 of 172
57. Question
1 pointsA user is hiking in a city park. The user wants to make a call home but cannot get a reliable cellular signal. What are two possible causes for the bad cellular coverage? (Choose two.)Correct
Incorrect
Hint
A mobile user may experience weak or dropped signal issues if there are not enough cell towers surrounding the area or the location is not covered well by the carrier. -
Question 58 of 172
58. Question
1 pointsA user purchases a new smartphone and is trying to use a high quality Bluetooth headset on the new device. However, the headset is not connected to the smartphone. What are three settings that the user needs to check to troubleshoot the problem? (Choose three.)Correct
Incorrect
Hint
Three factors contribute to a successful pairing between a Bluetooth capable host (the smartphone in this case) and a Bluetooth device (the headset):- The Bluetooth device is turned on.
- The pin code is entered correctly.
- The Bluetooth connection is enabled on the mobile device.
-
Question 59 of 172
59. Question
1 pointsA third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)Correct
Incorrect
Hint
The Remote Desktop protocol (RDP) is used to remotely access a Windows OS. It is a client/server protocol.The port number for RDP is TCP port 3389 and it uses encryption. -
Question 60 of 172
60. Question
1 pointsA computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?Correct
Incorrect
Hint
The World Wide Web (HTTP) protocol uses port 80; port 23 is used by Telnet. Successful pings to other devices indicate that the network interface card is working correctly. BIOS and CMOS settings control system hardware functions, not network applications such as the World Wide Web. -
Question 61 of 172
61. Question
1 pointsWhich question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?Correct
Incorrect
Hint
Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback. -
Question 62 of 172
62. Question
1 pointsA technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?Correct
Incorrect
Hint
As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking. -
Question 63 of 172
63. Question
1 pointsA user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?Correct
Incorrect
Hint
UAC is used to change user account settings while converting the file system to FAT16 and updating the driver for the graphics card will not resolve the issue. Compatibility mode in Windows 7 allows for the running of a program created for previous versions of the Windows environment. -
Question 64 of 172
64. Question
1 pointsIn which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?Correct
Incorrect
Hint
The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder. -
Question 65 of 172
65. Question
1 pointsWhat is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?Correct
Incorrect
Hint
Regardless of the levels of security configured on a WLAN, a WPA secured WLAN always requires the use of an encryption key. Without the proper key, a device cannot connect to the network. -
Question 66 of 172
66. Question
1 pointsWhat is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?Correct
Incorrect
Hint
Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network. A software firewall is used to prevent other users from gaining access to the protected computer. Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network. A proxy server is mostly used to filter traffic based on content. -
Question 67 of 172
67. Question
1 pointsA user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?Correct
Incorrect
Hint
Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced. -
Question 68 of 172
68. Question
1 pointsWhich setting must be turned on in order to share a printer in Windows 7?Correct
Incorrect
Hint
File and Printer Sharing must be turned on in order to share a printer in Windows 7. Share this Printer is a setting in Windows XP. Sharing is a setting in Windows Vista. Windows Firewall is not required to be turned on in order to share a printer. -
Question 69 of 172
69. Question
1 pointsA user is able to only access files required to perform a specific task. What type of security practice is being applied?Correct
Incorrect
Hint
Limiting access to files or folders that are needed to perform a specific job is known as the principle of least privilege. The other options do not exist. -
Question 70 of 172
70. Question
1 pointsA technician is troubleshooting a workstation in a domain that has been infected with a virus. What is the first step the technician should take to clean the infected workstation?Correct
Incorrect
Hint
The first step is to disconnect the infected workstation from the network. This will quarantine the infected workstation and prevent the virus from spreading throughout the network. -
Question 71 of 172
71. Question
1 pointsA technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?Correct
Incorrect
Hint
The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network. -
Question 72 of 172
72. Question
1 pointsA company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point?Correct
Incorrect
-
Question 73 of 172
73. Question
1 pointsWhat does virtual memory provide to an operating system?Correct
Incorrect
Hint
The OS uses virtual memory when a computer does not have enough RAM available to run a program. Virtual memory moves data from RAM and places it in a paging file on the hard drive. A paging file is a place where data is stored until enough RAM is available to process the data. This process is much slower than accessing the RAM directly. -
Question 74 of 172
74. Question
1 pointsWhy would an administrator use Windows Remote Desktop and Windows Remote Assistant?Correct
Incorrect
Hint
Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing. -
Question 75 of 172
75. Question
1 pointsA technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?Correct
Incorrect
Hint
Windows Remote Desktop allows a technician to log in to a remote computer through an existing user account. The technician can run programs and view and manipulate files within the system of the remote computer. -
Question 76 of 172
76. Question
1 pointsA business traveler connects to a wireless network with open authentication. What should the traveler do to secure confidential data when connecting to the business services?Correct
Incorrect
Hint
A VPN is used to form a secure tunnel across a public network. This technology allows users to communicate over an insecure network and yet keep data confidential. Changing the network location profile will modify firewall settings on a computer but not increase the confidentiality of data crossing a network. Modifying the IP address, subnet mask, and default gateway will not change the confidentiality of data transmitting on a network. -
Question 77 of 172
77. Question
1 pointsWhat determines the level of support that a call center technician will provide to an individual customer?Correct
Incorrect
Hint
A call center technician must provide the level of support that is outlined in the SLA for that individual customer. -
Question 78 of 172
78. Question
1 pointsA corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?Correct
Incorrect
Hint
A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network. -
Question 79 of 172
79. Question
1 pointsA user has been using a smartphone for several hours, but now the applications on the device have become unresponsive. What action should the user take?Correct
Incorrect
Hint
Restoring a device to factory defaults should only be done if either or both of the following have failed: restarting the device or turning the device off and powering it back on again. -
Question 80 of 172
80. Question
1 pointsA security audit for the human resources office finds that most employees leave confidential information on the screen when they are out of office for a short period of time. Which Windows control panel link should be used to make the monitor show a screen saver after a few minutes of inactivity and require that the user re-authenticate?Correct
Incorrect
Hint
Use the Control Panel > Personalization > Screen Saver path to select a screen saver and enable the On resume, display logon screen option. -
Question 81 of 172
81. Question
1 pointsWhich statement describes most enterprise software licenses?Correct
Incorrect
Hint
Enterprise software licenses enable many employees of an organization to use a software application, often without the need to register the individual installations. Personal software licenses are intended for personal use of the product. Most personal software licenses allow a user to run the software on only one PC. Open source licenses allow users to modify and share the source code of the software. -
Question 82 of 172
82. Question
1 pointsIn a Linux operating system, which component interprets user commands and forwards them to the OS?Correct
Incorrect
Hint
The functions of different components of a Linux system are as follows:- CLI – command-line interface, accepts user commands
- shell – a program that interprets the user commands and passes them to the OS
- kernel – manages CPU and RAM allocation to processes, system calls, and file systems
- application program – program for various applications
-
Question 83 of 172
83. Question
1 pointsIn Linux and OS X, which CLI command can be used to display the name of the current directory?Correct
Incorrect
Hint
The functions of listed CLI commands of Linux and OS X systems are as follows:- ps – lists the process currently running in the system
- pwd – displays the name of the current directory
- sudo – runs a command as another user
- chmod – modifies file permissions
-
Question 84 of 172
84. Question
1 pointsWhen installing application software on a Windows 7 workstation, the user sees an error message indicating that the installation is unsuccessful. What should the user try next?Correct
Incorrect
Hint
A possible reason that an application does not install successfully is that the application is not compatible with Windows 7. An application does not register its service if it is not installed successfully. The chkdsk command is used to check and recover disk errors. The bootrec command is used to check and recover the MBR/GPT of a system. -
Question 85 of 172
85. Question
1 pointsA virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?Correct
Incorrect
Hint
To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses. -
Question 86 of 172
86. Question
1 pointsWhich wireless encryption method is the least secure?Correct
Incorrect
Hint
WEP is the weakest encryption method. WPA, AES, and TKIP are considered enhancements to the WEP standard and therefore are more secure. -
Question 87 of 172
87. Question
1 pointsA customer is explaining a problem with a computer to a technician. The technician recognizes the problem prior to the customer finishing the explanation. What should the technician do?Correct
Incorrect
Hint
It is always important to allow the customer to finish explaining the problem at hand. You should always be attentive and actively listen to the customer without interrupting and acknowledge the customer occasionally to affirm that you are actively listening to the customer. -
Question 88 of 172
88. Question
1 pointsThe Windows PC of a user was shutdown abruptly due to a sudden loss of power. The user then reports that the workstation has lost several files. A help desk technician suspects that part of the hard disk might be damaged. Which Windows utility can the technician use to scan the hard disk and make repairs if necessary?Correct
Incorrect
Hint
The utility Chkdsk in Windows can be used to check the integrity of files and folders on a hard drive by scanning the file system. It also checks the disk surface for physical errors and tries to fix the errors. -
Question 89 of 172
89. Question
1 pointsA user calls the help desk and reports that the workstation, when powering up, displays error messages about an invalid system disk or invalid boot disk. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician checks the workstation and makes sure that the cable is firmly connected between the hard drive and the motherboard. What is another likely cause of the problem?Correct
Incorrect
Hint
These error messages indicate that the workstation cannot detect the hard drive as a bootable device. One possible cause is that the MBR/GPT on the hard drive is corrupted so that the workstation cannot locate a valid partition that holds the necessary codes to start booting. -
Question 90 of 172
90. Question
1 pointsA user calls the help desk and reports that invalid system disk or invalid boot disk error messages display on the workstation when it is powered on. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician suspects that the MBR is corrupted. Which process can the technician use to check and repair the MBR?Correct
Incorrect
Hint
The bootrec command can be used to repair and troubleshoot MBR issues. The chkdsk command can be used to check the integrity of files and folders by scanning the hard disk surface for physical errors. The sfc command can be used to verify and replace important Windows system files. -
Question 91 of 172
91. Question
1 pointsA student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?Correct
Incorrect
Hint
A new computer should have antivirus, or anti-spam filter for the email client, or anti-spam software installed to protect from spammers. -
Question 92 of 172
92. Question
1 pointsA sales representative is driving to visit several customer sites in the city. The representative notices that the smartphone is draining battery power more quickly than normal. What is a possible cause of the issue?Correct
Incorrect
Hint
When a mobile device is roaming among cells, the battery consumption is increased because the device needs to detect and negotiate with cell towers for connections. What the user experienced here is relative to the normal use. Thus, the issues of whether the device is fully charged and the condition of the battery charger are irrelevant. -
Question 93 of 172
93. Question
1 pointsA user attended the wedding of a coworker and took pictures using a smartphone. The user receives phone calls from several coworkers the next day and is shocked to learn that these pictures now appear on multiple web pages. What is a possible cause for the incident?Correct
Incorrect
Hint
Many service carriers offer cloud-based storage for mobile devices to upload contents to the cloud service for backup purposes. However, if the user account to the cloud service is compromised, a hacker can access the contents freely. -
Question 94 of 172
94. Question
1 pointsA student is jogging in a city park. The student has an app on the smartphone that tracks exercise activities. The student receives a notification that a new email has been received and stops to read the email message. However, the email app is slow to respond. What is a reason for the slowness of the app to open?Correct
Incorrect
Hint
The health app uses the GPS receiver to track certain exercise activities, such as jogging and running. GPS service uses a lot of device resources to find and sync with satellites. The GPS receiver locks onto the signals sent from the satellites and constantly calculates its position relative to these satellites. After the position has been determined, the GPS receiver calculates other information, such as speed, time, and distance to a programmed destination. While the GPS receiver is working, a mobile device may appear slow in response to other apps. -
Question 95 of 172
95. Question
1 pointsA user reports that the PC displays a warning message. The warning message indicates that the PC is infected by a virus. A technician comes with a USB drive that contains a malware detection and removal program. What should the technician do before running the program?Correct
Incorrect
Hint
Booting the PC in Safe Mode will prevent most drivers and applications from loading into the system. These may include drivers and programs related to malware. Safe Mode allows the antivirus software to scan all areas of the disk. -
Question 96 of 172
96. Question
1 pointsA user reports that a Windows 10 PC displays a warning message. The warning message indicates that the PC is infected by malware. A technician comes to the office and makes sure that the PC is disconnected from all wired and wireless networks. What should the technician do next to further investigate the incident?Correct
Incorrect
Hint
When a malware protection program detects that a computer is infected, it removes or quarantines the threat. However, the computer is most likely still at risk. The first step to remediating an infected computer is to remove the computer from the network to prevent other computers from becoming infected. The next step is to follow any incident response policies that are in place. The log files should be saved to a removable media for further analysis. Restarting an infected PC may destroy the evidence of infection. -
Question 97 of 172
97. Question
1 pointsAll Windows 10 computers in a small advertising company are configured with the System Restore service. One of the PCs was infected by malware when an employee was doing research on the internet. The IT administrator scans the system and deletes the malware from the Quarantined Items folder. What should the administrator do next to complete the remediation process?Correct
Incorrect
Hint
Once the System Restore service is turned on, a PC will create regular restore points. When the PC is infected with malware, the system restore points may contain infected files. Deleting all system restore points after the system has been remediated, prevents bringing infected files into the system when the System Restore service is needed. -
Question 98 of 172
98. Question
1 pointsA mobile user downloads and installs an app. Once the app is installed, the Android mobile device is frozen. What is a cause for the issue?Correct
Incorrect
Hint
A new app may not have been designed properly and may not be compatible with the OS on an Android device. Because of this, the device may appear frozen. -
Question 99 of 172
99. Question
1 pointsWhen a user tries to run a program, a missing or corrupt DLL message is displayed. What is a solution to fix the problem?Correct
Incorrect
Hint
A possible solution to a reported missing or corrupt DLL is to restart the computer in Safe Mode and run sfc /scannow. Windows Startup Repair is used to solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs. -
Question 100 of 172
100. Question
1 pointsA programmer needs to automate processes and tasks in an operating system. Which tool would the programmer use to build a script file?Correct
Incorrect
Hint
A script file is a simple text file used to automate processes and tasks on various operating systems. A “script” can be created by any common text editor. -
Question 101 of 172
101. Question
1 pointsA company has a guest wireless network available for visitors while on the company premises. A technician has noted that unauthorized users are connecting to this wireless network from outside the premises. Which action can be taken to reduce unauthorized connections to the guest wireless network while enabling visitors to still connect quickly and easily without assistance while on the company premises?Correct
Incorrect
Hint
Reducing the transmitted radio power to a level that gives network coverage only within the company premises will enable authorized visitors to continue to connect to the guest network connect quickly and easily without assistance, but prevent connection from outside the premises. Enabling MAC address filtering, configuring WPA encryption, and disabling SSID broadcast will prevent unauthorized access to the network. However, these actions will also make it more difficult for visitors to connect when the requirement is for quick and easy access without assistance. -
Question 102 of 172
102. Question
1 pointsWhat is an example of a web application using multifactor authentication?Correct
Incorrect
Hint
When multifactor authentication is implemented, two or more different authentication methods are used. Multifactor authentication is often used when accessing online services. For example, when a user wants to access a service, an authenticator application sends a code called a one-time password (OTP) to the registered phone or email address of the user. The user must supply the correct account username and password plus the OTP code to authenticate. -
Question 103 of 172
103. Question
1 pointsA user calls the help desk with the following situation. “I added a new PC to my LAN. I can ping other devices on my LAN but not any remote devices.” What advice should the help desk agent give to the caller?Correct
Incorrect
-
Question 104 of 172
104. Question
1 pointsWhich statement describes the active partition?Correct
Incorrect
-
Question 105 of 172
105. Question
1 pointsA technician has just purchased a new Windows 10 PC and wants to transfer selected files, folders, profiles, and applications from the old Windows PC. What tool or utility would be the best choice for the user?Correct
Incorrect
-
Question 106 of 172
106. Question
1 pointsA user wants to copy a group of files from one Windows directory to another. What is the best Windows command to select to do the job?Correct
Incorrect
-
Question 107 of 172
107. Question
1 pointsA technician wants to create customized system image files that will be installed on computers in the network. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 108 of 172
108. Question
1 pointsA user finds that when launching a downloaded Windows update file, Windows Update fails. What are two possible causes for this? (Choose two.)Correct
Incorrect
Hint
In the event that the downloaded update file is corrupted or a previously required update was not installed, the Windows Update process will fail. -
Question 109 of 172
109. Question
1 pointsWhich key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?Correct
Incorrect
-
Question 110 of 172
110. Question
1 pointsA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?Correct
Incorrect
Hint
Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding. -
Question 111 of 172
111. Question
1 pointsA technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?Correct
Incorrect
Hint
ASR is used to recover the operating system when it is totally corrupt and will not boot. Regedit is a registry editor whereas Fixmbr and Fixboot are command line utilities that can be used to repair corrupt boot records. SFC is used to check the integrity of any system files that may have been corrupted and repair them. -
Question 112 of 172
112. Question
1 pointsWhich disk management tool scans the critical files of an operating system and replaces the corrupt files?Correct
Incorrect
Hint
System File Checker will scan critical files of an operating system and replace corrupt files. Scandisk and Chkdsk check the integrity of files and folders on a hard drive. Optimize Drives optimizes space on a hard drive. Disk Cleanup will clear space on a hard drive by looking for files that can be deleted. -
Question 113 of 172
113. Question
1 pointsA computer technician is notified by a user that there are no automated backups being created on an Apple computer. What is the first thing the technician should check?Correct
Incorrect
Hint
Time Machine is the OS X backup tool. To verify whether the tool is turned on, access Settings > Time Machine. -
Question 114 of 172
114. Question
1 pointsA user reports that an application crashed. The technician tries a few other applications on the PC and finds that none of them start normally or that they crash soon after being launched. What is a possible cause of the problem?Correct
Incorrect
Hint
A virus infection could cause issues such as a file name change, one or more applications crashing, or files disappearing on a PC. The failing hard disk and lack of updates from the vendors should not cause the same issues for multiple applications. The Windows Firewall being off is not a direct cause of such issues. -
Question 115 of 172
115. Question
1 pointsA user calls the help desk and reports that a security alert appears on the screen about a malware attempt to enter the PC. What should the technician instruct the user to do?Correct
Incorrect
Hint
The security alert indicates that the antimalware software has detected a potential malware attack. There could be other malware attacks toward the PC. Therefore, the user should be proactive and run a thorough security scan to remove any malware that is found. -
Question 116 of 172
116. Question
1 pointsA user is shopping in a mall and gets a notification that a new email is received on the smartphone. The user is wondering how the email message was delivered because the data usage feature is turned off. The user notices that the smartphone is connected to the coffee shop inside the mall using Wi-Fi. What caused this connection?Correct
Incorrect
Hint
When a mobile device is set to automatically connect to unknown Wi-Fi networks, the device will search and connect to any open access Wi-Fi networks. -
Question 117 of 172
117. Question
1 pointsA programmer is building a script that will test a condition of either true or false. Which data type would the programmer use?Correct
Incorrect
Hint
The basic data types used in a script include:- int represents integers
- char represents characters
- float represents decimal numbers
- strings represent alphanumeric characters
- Bool represents true or false
-
Question 118 of 172
118. Question
1 pointsA user has a computer that is infected with spyware. What should be performed after the spyware is completely cleaned?Correct
Incorrect
Hint
An infected computer that performs a system restore will save the virus or spyware along with the restore point. Therefore, system restore files must be deleted after the removal of malware. -
Question 119 of 172
119. Question
1 pointsA technician calls the help desk with the following situation. “I am trying to save a file to my RAID drive but my system cannot find it.” What advice should the help desk agent give to the caller?Correct
Incorrect
-
Question 120 of 172
120. Question
1 pointsWhich statement describes a primary partition?Correct
Incorrect
-
Question 121 of 172
121. Question
1 pointsA support technician wants to upgrade a system to Windows 10 but is unsure whether the hardware and software on the existing system are compatible. What tool or utility would be the best choice for the user?Correct
Incorrect
-
Question 122 of 172
122. Question
1 pointsA user is deleting old files and wants to see all files in the current directory. What is the best Windows command to select to do the job?Correct
Incorrect
-
Question 123 of 172
123. Question
1 pointsA technician is troubleshooting a Windows 10 PC that has a .dll file for an application that has not been registered. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 124 of 172
124. Question
1 pointsAn IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)Correct
Incorrect
Hint
While working with customers both briefly and over an extended period of time, it is possible to form friendly relationships. It is important to always follow company policy and never send unsolicited messages to a customer. Also do not send unsolicited mass mailings or chain letters to customers from a company email address. Any personal relationships should be kept via personal email accounts and should not reflect the IT organization of the employer. -
Question 125 of 172
125. Question
1 pointsA user finds that when launching a downloaded Windows update file, Windows Update fails. What are two possible causes for this? (Choose two.)Correct
Incorrect
Hint
In the event that the downloaded update file is corrupted or a previously required update was not installed, the Windows Update process will fail. -
Question 126 of 172
126. Question
1 pointsA server administrator needs to remotely configure a legacy network device. The legacy network device only supports a plain-text session connection. Which remote access tool should be used?Correct
Incorrect
Hint
Legacy devices may not support remote access sessions that require encryption. These devices may rely on using plain-text sessions provided by the Telnet protocol on TCP port 23. -
Question 127 of 172
127. Question
1 pointsWhich statement describes a logical drive?Correct
Incorrect
-
Question 128 of 172
128. Question
1 pointsA technician wants to open a remote desktop utility to connect to a remote computer on a Windows 10 PC. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 129 of 172
129. Question
1 pointsA technician needs to capture the company user accounts, files, operating system settings, and application settings for migration into the new Windows 10 installation. What tool or utility would be the best choice for the user?Correct
Incorrect