لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists.Which of the following would MOST likely resolve the issue?
A. Quarantining system files
B. Reimaging the workstation
C. Encrypting the hard drive
D. Disabling TLS 1
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?
A. mplementing a support portal
B. reating a ticketing system
C. ommissioning an automated callback system
D. ubmitting tickets through email
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?
A. isable the browser from sending notifications to the Action Center
B. un a full antivirus scan on the computer
C. isable all Action Center notifications
D. ove specific site notifications from Allowed to Block
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened while browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?
A. hut down the infected computer and swap it with another computer
B. nvestigate what the interface is and what triggered it to pop up
C. roceed with initiating a full scan and removal of the viruses using the presented interface
D. all the phone number displayed in the interface of the antivirus removal tool
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following is a package management utility for PCs that are running the Linux operating system?
A. hmod
B. um
C. an
D. rep
عرض الإجابة
اجابة صحيحة: B
السؤال #6
After clicking on a link in an email, a Chief Financial Officer (CFO) received the following error:The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?
A. pdate the browser's CRLs
B. ile a trouble ticket with the bank
C. ontact the ISP to report the CFO's concern
D. nstruct the CFO to exit the browser
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.Which of the following should a technician do to remediate the issue?
A. oll back the updates
B. ncrease the page file
C. pdate the drivers
D. ebuild the profile
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A user received the following error upon visiting a banking website:The security certificate presented by this website was issued for a different website's address.A technician should instruct the user to:
A. lear the browser cache and contact the bank
B. lose out of the site and contact the bank
C. ontinue to the site and contact the bank
D. pdate the browser and contact the bank
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A systems administrator needs to reset a user's password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account. Which of the following should the systems administrator do?
A. equire the user to change the password at the next log-in
B. isallow the user from changing the password
C. isable the account
D. hoose a password that never expires
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?
A. se a key combination to lock the computer when leaving
B. nsure no unauthorized personnel are in the area
C. onfigure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity
D. urn off the monitor to prevent unauthorized visibility of information
عرض الإجابة
اجابة صحيحة: A
السؤال #11
An Android user reports that when attempting to open the company's proprietary mobile application, it immediately closes. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?
A. ninstall and reinstall the application
B. eset the phone to factory settings
C. nstall an alternative application with similar functionality
D. lear the application cache
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?
A. ock all devices in a closet
B. nsure all devices are from the same manufacturer
C. hange the default administrative password
D. nstall the latest operating system and patches
عرض الإجابة
اجابة صحيحة: C
السؤال #13
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the log-in issue?
A. xpired certificate
B. S update failure
C. ervice not started
D. pplication crash
E. rofile rebuild needed
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?
A. ower user account
B. tandard account
C. uest account
D. dministrator account
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?
A. onvert the PC from a DHCP assignment to a static IP address
B. un a speed test to ensure the advertised speeds are met
C. est all network sharing and printing functionality the customer uses
D. hange the default passwords on new network devices
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Which of the following is a consequence of end-of life operating systems?
A. perating systems void the hardware warranty
B. perating systems cease to function
C. perating systems no longer receive updates
D. perating systems are unable to migrate data to the new operating system
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A technician received a call stating that all files in a user's documents folder appear to be changed, and each of the files now has a .lock file extension. Which of the following actions is the FIRST step the technician should take?
A. un a live disk clone
B. un a full antivirus scan
C. se a batch file to rename the files
D. isconnect the machine from the network
عرض الإجابة
اجابة صحيحة: D
السؤال #18
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?
A. ansomware
B. ailed OS updates
C. dware
D. issing system files
عرض الإجابة
اجابة صحيحة: D
السؤال #19
A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?
A. fc
B. hkdsk
C. it clone
D. obocopy
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?
A. pdate the browser's CRLs
B. ile a trouble ticket with the bank
C. ontact the ISP to report the CFO's concern
D. nstruct the CFO to exit the browser
عرض الإجابة
اجابة صحيحة: B
السؤال #21
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?
A. ights management
B. udit trail
C. hain of custody
D. ata integrity
عرض الإجابة
اجابة صحيحة: C
السؤال #22
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?
A. isk analysis
B. andbox testing
C. nd user acceptance
D. essons learned
عرض الإجابة
اجابة صحيحة: A
السؤال #23
A technician is unable to join a Windows 10 laptop to a domain. Which of the following is the MOST likely reason?
A. reeBSD
B. hrome OS
C. acOS
D. indows
عرض الإجابة
اجابة صحيحة: B
السؤال #24
A technician installed an application on a user's desktop and received an error message. Which of the following tools can the technician use to research the error?
A. ncrypting File System
B. ile Vault
C. itLocker
D. ncrypted LVM
عرض الإجابة
اجابة صحيحة: C
السؤال #25
An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy, unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?
A. daily, incremental backup that is saved to the corporate file server
B. n additional, secondary hard drive in a mirrored RAID configuration
C. full backup of the data that is stored off site in cold storage
D. eekly, differential backups that are stored in a cloud-hosting provider
عرض الإجابة
اجابة صحيحة: C
السؤال #26
A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?
A. nabling System Restore
B. ducating the user
C. ooting into safe mode
D. cheduling a scan
عرض الإجابة
اجابة صحيحة: C
السؤال #27
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?
A. earranging the monitor's position in display settings
B. wapping the cables for the monitors
C. sing the Ctrl+Alt+=> to correct the display orientation
D. pdating the display drivers for the video card
عرض الإجابة
اجابة صحيحة: A
السؤال #28
While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?
A. end a quick message regarding the delay to the next customer
B. ut the current customer's time short and rush to the next customer
C. pologize to the next customer when arriving late
D. rrive late to the next meeting without acknowledging the time
عرض الإجابة
اجابة صحيحة: A
السؤال #29
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened while browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?
A. Shut down the infected computer and swap it with another computer
B. Investigate what the interface is and what triggered it to pop up
C. Proceed with initiating a full scan and removal of the viruses using the presented interface
D. Call the phone number displayed in the interface of the antivirus removal tool
عرض الإجابة
اجابة صحيحة: C
السؤال #30
A user reports that a workstation is operating sluggishly. Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?
A. Increase the paging file size
B. Run the chkdsk command
C. Rebuild the user?€?s profile
D. Add more system memory
E. Defragment the hard drive
عرض الإجابة
اجابة صحيحة: C
السؤال #31
A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)
A. he domain's processor compatibility is not met
B. he laptop has Windows 10 Home installed
C. he laptop does not have an onboard Ethernet adapter
D. he laptop does not have all current Windows updates installed
عرض الإجابة
اجابة صحيحة: AC
السؤال #32
A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
A. he GPS application is installing software updates
B. he GPS application contains malware
C. he GPS application is updating its geospatial map data
D. he GPS application is conflicting with the built-in GPS
عرض الإجابة
اجابة صحيحة: D
السؤال #33
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?
A. ryptominer
B. hishing
C. ansomware
D. eylogger
عرض الإجابة
اجابة صحيحة: C
السؤال #34
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?
A. eset the phone to factory settings
B. ninstall the fraudulent application
C. ncrease the data plan limits
D. isable the mobile hotspot
عرض الإجابة
اجابة صحيحة: B
السؤال #35
A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi. When the smartphone is connected to Wi-Fi, the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?
A. he smartphone's line was not provisioned with a data plan
B. he smartphone's SIM card has failed
C. he smartphone's Bluetooth radio is disabled
D. he smartphone has too many applications open
عرض الإجابة
اجابة صحيحة: A
السؤال #36
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?
A. cope of change
B. isk level
C. ollback plan
D. nd user acceptance
عرض الإجابة
اجابة صحيحة: C
السؤال #37
Which of the following is the MOST basic version of Windows that includes BitLocker?
A. ome
B. ro
C. nterprise
D. ro for Workstations
عرض الإجابة
اجابة صحيحة: B
السؤال #38
A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?
A. hanging the office's Wi-Fi SSID and password
B. erforming a remote wipe on the device
C. hanging the user's password
D. nabling remote drive encryption
عرض الإجابة
اجابة صحيحة: B
السؤال #39
Which of the following is used to identify potential issues with a proposed change prior to implementation?
A. equest form
B. ollback plan
C. nd-user acceptance
D. andbox testing
عرض الإجابة
اجابة صحيحة: D
السؤال #40
A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?
A. EFI password
B. ecure boot
C. ccount lockout
D. estricted user permissions
عرض الإجابة
اجابة صحيحة: A
السؤال #41
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?
A. DM
B. ULA
C. RP
D. UP
عرض الإجابة
اجابة صحيحة: D
السؤال #42
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?
A. AT32
B. xt4
C. TFS
D. xFAT
عرض الإجابة
اجابة صحيحة: D
السؤال #43
A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?
A. he SNTP server is offline
B. user changed the time zone on a local machine
C. he Group Policy setting has disrupted domain authentication on the system
D. he workstations and the authentication server have a system clock difference
عرض الإجابة
اجابة صحيحة: B
السؤال #44
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?
A. rute force
B. ero day
C. enial of service
D. n-path
عرض الإجابة
اجابة صحيحة: B
السؤال #45
answer changeWhich of the following file extensions are commonly used to install applications on a macOS machine? (Choose three.)
A. ervices in Control Panel to check for overutilization
B. erformance Monitor to check for resource utilization
C. ystem File Checker to check for modified Windows files
D. vent Viewer to identify errors
عرض الإجابة
اجابة صحيحة: BCDG
السؤال #46
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?
A. um off airplane mode while at the register
B. erify that NFC is enabled
C. onnect to the store's Wi-Fi network
D. nable Bluetooth on the phone
عرض الإجابة
اجابة صحيحة: B
السؤال #47
Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.)
A. PA3
B. PA-AES
C. EP
D. PA-TKIP
عرض الإجابة
اجابة صحيحة: AB
السؤال #48
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?
A. PA2 with TKIP
B. PA2 with AES
C. PA3 with AES-256
D. PA3 with AES-128
عرض الإجابة
اجابة صحيحة: B
السؤال #49
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?
A. ncryption
B. i-Fi channel
C. efault passwords
D. ervice set identifier
عرض الإجابة
اجابة صحيحة: C
السؤال #50
The network was breached over the weekend. System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?
A. ncryption at rest
B. ccount lockout
C. utomatic screen lock
D. ntivirus
عرض الإجابة
اجابة صحيحة: B
السؤال #51
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email.The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?
A. dvise the user to run a complete system scan using the OS anti-malware application
B. uide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
C. ave the user check for recently installed applications and outline those installed since the link in the email was clicked
D. nstruct the user to disconnect the Ethernet connection to the corporate network
عرض الإجابة
اجابة صحيحة: D
السؤال #52
A department has the following technical requirements for a new application:Quad Core processor250GB of hard drive space6GB of RAMTouch screensThe company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?
A. ime drift
B. ual in-line memory module failure
C. pplication crash
D. ilesystem errors
عرض الإجابة
اجابة صحيحة: C
السؤال #53
A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?
A. uards
B. ollards
C. otion sensors
D. ccess control vestibule
عرض الإجابة
اجابة صحيحة: B
السؤال #54
A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?
A. ystem
B. ndexing Options
C. evice Manager
D. rograms and Features
عرض الإجابة
اجابة صحيحة: A
السؤال #55
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?
A. ull
B. on-parity
C. ifferential
D. ncremental
عرض الإجابة
اجابة صحيحة: A
السؤال #56
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?
A. eyboard
B. ouch pad
C. ase of Access Center
D. isplay settings
عرض الإجابة
اجابة صحيحة: C
السؤال #57
A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?
A. ave the user consider using an iPad if the user is unable to complete updates
B. ave the user text the user's password to the technician
C. sk the user to click in the Search field, type Check for Updates, and then press the Enter key
D. dvise the user to wait for an upcoming, automatic patch
عرض الإجابة
اجابة صحيحة: C
السؤال #58
A user who is unable to connect to the network submits a help desk ticket. The assigned help desk technician inquires about whether any recent changes have been made. The user reports there is construction activity in the surrounding offices. The help desk technician proceeds to ping the user's desktop, which does not respond. Which of the following is the MOST likely cause of this issue?
A. duplicate IP address has been issued to the user's desktop
B. he HDD of the OS is failing
C. he network cable has become disconnected
D. alware has infected the system
عرض الإجابة
اجابة صحيحة: C
السؤال #59
A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?
A. eset the phone to factory settings
B. ninstall the fraudulent application
C. ncrease the data plan limits
D. isable the mobile hotspot
عرض الإجابة
اجابة صحيحة: C
السؤال #60
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 4GB of RAM?
A. he UEFI settings need to be changed
B. he RAM has compatibility issues with Windows 10
C. ome of the RAM is defective
D. he newly installed OS is x86
عرض الإجابة
اجابة صحيحة: D
السؤال #61
A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?
A. anguage
B. ystem
C. ersonalization
D. ase of Access
عرض الإجابة
اجابة صحيحة: A
السؤال #62
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?
A. egaussing
B. ow-level formatting
C. ecycling
D. hredding
عرض الإجابة
اجابة صحيحة: D
السؤال #63
A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?
A. einstalling Windows
B. erforming a quick format
C. sing disk-wiping software
D. eleting all files from command-line interface:
عرض الإجابة
اجابة صحيحة: C
السؤال #64
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?
A. ull
B. ifferential
C. ff-site
D. randfather-father-son
عرض الإجابة
اجابة صحيحة: B
السؤال #65
A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?
A. Language
B. System
C. Personalization
D. Ease of Access
عرض الإجابة
اجابة صحيحة: A
السؤال #66
A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine.The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?
A. Spyware
B. Cryptominer
C. Ransomware
D. Boot sector virus
عرض الإجابة
اجابة صحيحة: B
السؤال #67
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?
A. ventvwr
B. erfmon
C. pedit
D. evmgmt
عرض الإجابة
اجابة صحيحة: D
السؤال #68
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?
A. ight-click the Windows button, then select Run
B. emark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
C. anually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup
D. pen the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup
عرض الإجابة
اجابة صحيحة: D
السؤال #69
A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?
A. PS
B. KIP
C. PA3
D. EP
عرض الإجابة
اجابة صحيحة: C
السؤال #70
A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?
A. ithin the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never
B. ithin the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never
C. ithin the Power Options of the Control Panel utility, select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never
D. ithin the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged In category to Do Nothing
عرض الإجابة
اجابة صحيحة: D
السؤال #71
Which of the following Wi-Fi protocols is the MOST secure?
A. WPA3
B. WPA-AES
C. WEP
D. WPA-TKIP
عرض الإجابة
اجابة صحيحة: A
السؤال #72
A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?
A. igh availability
B. egionally diverse backups
C. n-site backups
D. ncremental backups
عرض الإجابة
اجابة صحيحة: B
السؤال #73
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?
A. IN-based login
B. uarterly password changes
C. ard drive encryption
D. physical laptop lock
عرض الإجابة
اجابة صحيحة: C
السؤال #74
A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?
A. hanging channels
B. odifying the wireless security
C. isabling the SSID broadcast
D. hanging the access point name
عرض الإجابة
اجابة صحيحة: A
السؤال #75
A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?
A. isable the browser from sending notifications to the Action Center
B. un a full antivirus scan on the computer
C. isable all Action Center notifications
D. ove specific site notifications from Allowed to Block
عرض الإجابة
اجابة صحيحة: B
السؤال #76
Which of the following is the STRONGEST wireless configuration?
A. PS
B. PA3
C. EP
D. MN
عرض الإجابة
اجابة صحيحة: B
السؤال #77
A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?
A. ock
B. potlight
C. ission Control
D. aunchpad
عرض الإجابة
اجابة صحيحة: C
السؤال #78
A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?
A. evice Manager
B. ystem
C. ase of Access Center
D. rograms and Features
عرض الإجابة
اجابة صحيحة: C
السؤال #79
A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?
A. ull
B. irror
C. ncremental
D. ifferential
عرض الإجابة
اجابة صحيحة: C
السؤال #80
A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?
A. igned system images
B. ntivirus
C. SO
D. DM
عرض الإجابة
اجابة صحيحة: D
السؤال #81
The command cat comptia.txt was issued on a Linux terminal. Which of the following results should be expected?
A. he contents of the text comptia
B. he contents of the text comptia
C. he contents of the text comptia
D. he contents of the text comptia
عرض الإجابة
اجابة صحيحة: B
السؤال #82
A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?
A. ncrypt the workstation hard drives
B. ock the workstations after five minutes of inactivity
C. nstall privacy screens
D. og off the users when their workstations are not in use
عرض الإجابة
اجابة صحيحة: B
السؤال #83
Which of the following is a proprietary Cisco AAA protocol?
A. TKIP
B. AES
C. RADIUS
D. TACACS+
عرض الإجابة
اجابة صحيحة: D
السؤال #84
A technician suspects the boot disk of a user’s computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?
A. un sfc / scannow on the drive as the administrator
B. un cleanmgr on the drive as the administrator
C. un chkdsk on the drive as the administrator
D. un dfrgui on the drive as the administrator
عرض الإجابة
اجابة صحيحة: C
السؤال #85
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?
A. ower off the machine
B. un a full antivirus scan
C. emove the LAN card
D. nstall a different endpoint solution
عرض الإجابة
اجابة صحيحة: A
السؤال #86
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?
A. ifferential backup
B. ff-site backup
C. ncremental backup
D. ull backup
عرض الإجابة
اجابة صحيحة: D
السؤال #87
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?
A. MDM
B. EULA
C. IRP
D. AUP
عرض الإجابة
اجابة صحيحة: D
السؤال #88
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?
A. SRA
B. NC
C. PN
D. SH
عرض الإجابة
اجابة صحيحة: C
السؤال #89
After clicking on a link in an email, a Chief Financial Officer (CFO) received the following error:The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?
A. un a startup script that removes files by name
B. rovide a sample to the antivirus vendor
C. anually check each machine
D. onitor outbound network traffic
عرض الإجابة
اجابة صحيحة: A
السؤال #90
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?
A. Internet-based upgrade
B. Repair installation
C. Clean install
D. USB repair
E. In-place upgrade
عرض الإجابة
اجابة صحيحة: C
السؤال #91
Which of the following is the MOST important environmental concern inside a data center?
A. attery disposal
B. lectrostatic discharge mats
C. oner disposal
D. umidity levels
عرض الإجابة
اجابة صحيحة: D
السؤال #92
A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to MOST likely resolve the issue?
A. rant permissions to the installation directory
B. ttach the external hardware token
C. nstall OS updates
D. estart the workstation after installation
عرض الإجابة
اجابة صحيحة: B
السؤال #93
A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?
A. he instructions from the software company are not being followed
B. ecurity controls will treat automated deployments as malware
C. he deployment script is performing unknown actions
D. opying scripts off the internet is considered plagiarism
عرض الإجابة
اجابة صحيحة: C
السؤال #94
A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS is several versions out of date. The user is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the issue?
A. he device does not have enough free space to download the OS updates
B. he device needs user confirmation to update to a major release
C. he device is not compatible with the newest version of the OS
D. he device is restricted from updating due to a corporate security policy
عرض الإجابة
اجابة صحيحة: D
السؤال #95
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?
A. retexting
B. poofing
C. ishing
D. careware
عرض الإجابة
اجابة صحيحة: C
السؤال #96
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?
A. ome
B. ro for Workstations
C. nterprise
D. ro
عرض الإجابة
اجابة صحيحة: D
السؤال #97
Which of the following physical security controls can prevent laptops from being stolen?
A. ncryption
B. oJack
C. ultifactor authentication
D. quipment lock
E. ollards
عرض الإجابة
اجابة صحيحة: D
السؤال #98
The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.)
A. isk Cleanup
B. roup Policy Editor
C. isk Management
D. esource Monitor
عرض الإجابة
اجابة صحيحة: AF
السؤال #99
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?
A. einstalling Windows
B. erforming a quick format
C. sing disk-wiping software
D. eleting all files from command-line interface:
عرض الإجابة
اجابة صحيحة: B
السؤال #100
Which of the following OS types provides a lightweight option for workstations that need an easy-to-use, browser-based interface?
A. avigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete
B. avigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign-in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete
C. avigate to the Windows 10 Settings menu, select the Update & Security submenu, select Windows Security, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete
D. avigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete
عرض الإجابة
اجابة صحيحة: B
السؤال #101
Which of the following data is MOST likely to be regulated?
A. ame in a phone book
B. ame on a medical diagnosis
C. ame on a job application
D. ame on an employer's website
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: