Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Full Access
Question # 5

A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?

A.

Escalate the issue to a senior team member and provide next steps to the customer.

B.

Dismiss the customer and reschedule another troubleshooting session at a later date.

C.

Interrupt the customer and express that troubleshooting support tickets can take time.

D.

Maintain a positive attitude and continue to ask questions regarding the scope of the issue.

Full Access
Question # 6

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Full Access
Question # 7

Which of the following is used to detect and record access to restricted areas?

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Full Access
Question # 8

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

A.

Event Viewer

B.

Performance Monitor

C.

System Information

D.

Device Manager

Full Access
Question # 9

Which of the following is used to apply corporate restrictions on an Apple device?

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Full Access
Question # 10

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Full Access
Question # 11

A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?

A.

Encryption

B.

Remote wipe

C.

Geofencing

D.

Facial recognition

Full Access
Question # 12

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

A.

Connect remotely to the user's computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Full Access
Question # 13

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 14

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Full Access
Question # 15

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

A.

Multifactor authentication

B.

Encryption

C.

Backups

D.

Strong passwords

Full Access
Question # 16

Which of the following is a Linux command that is used for administrative purposes?

A.

runas

B.

cmcl

C.

net user

D.

su

Full Access
Question # 17

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Full Access
Question # 18

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Full Access
Question # 19

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Full Access
Question # 20

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Full Access
Question # 21

A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?

A.

Secure management access

B.

Group Policy Editor

C.

Content filtering

D.

Firewall

Full Access
Question # 22

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?

A.

16GB RAM

B.

Intel i7 CPU

C.

500GB HDD

D.

1Gbps Ethernet

Full Access