لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
A. Restore the device to factory settings
B. Uninstall the unapproved application
C. Disable the ability to install applications from unknown sources
D. Ensure the device is connected to the corporate WiFi network
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?
A. Cryptominer
B. Phishing
C. Ransomware
D. Keylogger
عرض الإجابة
اجابة صحيحة: A
السؤال #3
An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?
A. Uninstall and reinstall the application
B. Reset the phone to factory settings
C. Install an alternative application with similar functionality
D. Clear the application cache
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue. Which of the following should a technician do to remediate the issue?
A. Roll back the updates
B. Increase the page file
C. Update the drivers
D. Rebuild the profile
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A user's Windows desktop continuously crashes during boot. A technician runs the following command in safe mode and then reboots the desktop: c:\Windows\system32> sfc /scannowWhich of the following BEST describes why the technician ran this command?
A. The user's profile is damageD
B. The system files are corrupteD
C. The hard drive needs to be defragmenteD
D. The system needs to have a restore performeD
عرض الإجابة
اجابة صحيحة: b
السؤال #6
A technician is installing M.2 devices in several workstations. Which of the following would be required when installing the devices?
A. Air filtration
B. Heat-resistant gloves
C. Ergonomic floor mats
D. Electrostatic discharge straps
عرض الإجابة
اجابة صحيحة: d
السؤال #7
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?
A. NTFS
B. APFS
C. ext4
D. exFAT
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A user calls the IT help desk and explains that all the data on the user's computer is encrypteD. The user also indicates that a pop-up message on the screen is asking for payment in Bitcoins to unlock the encrypted datA.The user's computer is MOST likely infected with which of the following?
A. Botnet
B. Spyware
C. Ransomware
D. Rootkit
عرض الإجابة
اجابة صحيحة: c
السؤال #10
A technician has been directed to dispose of hard drives from company laptops properly. Company standards require the use of a high-powered magnet to destroy data on decommissioned hard drives.Which of the following data destruction methods should the technician choose?
A. Degaussing
B. Drilling
C. Incinerating
D. Shredding
عرض الإجابة
اجابة صحيحة: a
السؤال #11
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).
A. ipconfig /all
B. hostname
C. netstat /?
D. nslookup localhost
E. arp —a
F. ping :: 1
عرض الإجابة
اجابة صحيحة: C
السؤال #12
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?
A. Scope of change
B. Risk level
C. Rollback plan
D. End user acceptance
عرض الإجابة
اجابة صحيحة: C
السؤال #13
The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?
A. Data usage limits
B. Wi-Fi connection speed
C. Status of airplane mode
D. System uptime
عرض الإجابة
اجابة صحيحة: AC
السؤال #14
A network engineer needs to update a network firewall, which will cause a temporary outagE. The network engineer submits a change request form to perform the required maintenancE.If the firewall update fails, which of the following is the NEXT step?
A. Perform a risk analysis
B. Execute a backout plan
C. Request a change approval
D. Acquire end user acceptancE
عرض الإجابة
اجابة صحيحة: b
السؤال #15
Which of the following workstation operating systems uses NTFS for the standard filesystem type?
A. macOS
B. Windows
C. Chrome OS
D. Linux
عرض الإجابة
اجابة صحيحة: b
السؤال #16
A user reports being unable to access the Internet or use wireless headphones on a mobile devicE. The technician confirms the headphones properly connect to another devicE.Which of the following should the technician do to solve the issue?
A. Turn off airplane modE
B. Connect to a different service set identifier
C. Test the battery on the devicE
D. Disable near-field communication
عرض الإجابة
اجابة صحيحة: a
السؤال #17
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?
A. The UEFI settings need to be changed
B. The RAM has compatibility issues with Windows 10
C. Some of the RAM is defective
D. The newly installed OS is x86
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which of the following is a proprietary Cisco AAA protocol?
A. TKIP
B. AES
C. RADIUS
D. TACACS+
عرض الإجابة
اجابة صحيحة: D
السؤال #19
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?
A. Quarantining system files
B. Reimaging the workstation
C. Encrypting the hard drive
D. Disabling TLS 1
عرض الإجابة
اجابة صحيحة: A
السؤال #20
A sales staff member recently left a laptop at a hotel and needs a new one immediately. After remotely wiping the old laptop, a support technician prepares to take a new laptop out of inventory to begin the deployment process.Which of the following should the technician do FIRST?
A. Recycle all the cardboard and other shipping materials appropriately
B. Call the hotel and demand the old laptop be sent back to the repair depot
C. Confirm the shipping address for the new laptop with the sales staff member
D. Document the serial numbers and usernames for asset management
عرض الإجابة
اجابة صحيحة: d
السؤال #21
Which of the following symptoms is MOST likely a sign of ransomware?
A. Internet connectivity is lost
B. Battery life is reduceD
C. Files on devices are inaccessiblE
D. A large number of ads appear
عرض الإجابة
اجابة صحيحة: c

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: