Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following malware types typically has very high computing resource usage?

A.

Rootkit

B.

Cryptominer

C.

Boot sector virus

D.

Trojan

Full Access
Question # 5

Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?

A.

Use xcopy to clone the hard drives from one to another

B.

Use robocopy to move the files to each device

C.

Use a local image deployment tool for each device

D.

Use a network-based remote installation tool

Full Access
Question # 6

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Full Access
Question # 7

Which of the following filesystem types does the Linux OS use?

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Full Access
Question # 8

A user takes an iOS-based smartphone to a repair shop due to performance issues. The technician observes:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Used space: 63.76GB / 64GB

Which of the following is the most likely cause of the performance issue?

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Full Access
Question # 9

A user switches from Linux to Windows and tries to migrate data using an external USB drive. Windows prompts that the device must be formatted. It works fine on Linux. What should the user do?

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Full Access
Question # 10

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

A.

SPICE

B.

SSH

C.

RDP

D.

VPN

E.

RMM

F.

WinRM

Full Access
Question # 11

Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Full Access
Question # 12

A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?

A.

To utilize an SSO connection

B.

To securely establish a console session

C.

To encrypt and decrypt protected messages

D.

To facilitate device log reviews

Full Access
Question # 13

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Full Access
Question # 14

A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Full Access
Question # 15

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Full Access
Question # 16

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Full Access
Question # 17

A technician installs VPN client software that has a software bug from the vendor. After the vendor releases an update to the software, the technician attempts to reinstall the software but keeps getting an error message that the network adapter for the VPN already exists. Which of the following should the technician do next to mitigate this issue?

A.

Run the latest OS security updates.

B.

Map the network adapter to the new software.

C.

Update the network adapter's firmware.

D.

Delete hidden network adapters.

Full Access
Question # 18

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Full Access
Question # 19

A secretary receives an email from the company's chief executive officer with a request to pay a vendor immediately. After the payment is made, the CEO informs the secretary that they never sent that email. Which of the following social engineering tactics best describes this type of attack?

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Full Access
Question # 20

A user's application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Full Access
Question # 21

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

A.

Physical media

B.

Mountable ISO

C.

Manual installation

D.

Image deployment

Full Access
Question # 22

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 23

A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?

A.

Port mapping

B.

Subnetting

C.

Static IP

D.

Content filtering

Full Access
Question # 24

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and also appears to become stuck during connection attempts. Which of the following is most likely causing the disruption?

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal

Full Access
Question # 25

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Full Access
Question # 26

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Full Access
Question # 27

An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?

A.

License assignment

B.

VPN connection

C.

Application repair

D.

Program reinstallation

Full Access
Question # 28

A technician reviews an organization's incident management policy. The organization uses a third-party vendor with multiple tools to protect its assets. What service type is this?

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Full Access
Question # 29

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

Full Access
Question # 30

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message "No operating system found." The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Full Access
Question # 31

A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)

A.

Defragment the hard drive

B.

Enable SSH

C.

Enable screensaver locks

D.

Disable iCloud integration

E.

Enable the firewall

F.

Apply the BIOS password

Full Access
Question # 32

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Full Access
Question # 33

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Full Access
Question # 34

Which of the following are system folders on macOS? (Select two)

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Full Access
Question # 35

Which of the following is used to store passwords in macOS?

A.

FileVault

B.

Keychain

C.

Accessibility

D.

Mission Control

Full Access
Question # 36

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact business. The patch requires downtime. What should the administrator do?

A.

Create a standard change request.

B.

Implement an emergency change.

C.

Immediately freeze all changes.

D.

Continue operations until the next change interval.

Full Access
Question # 37

An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk

Full Access
Question # 38

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 39

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Full Access
Question # 40

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Full Access
Question # 41

A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?

A.

Encryption

B.

Remote wipe

C.

Geofencing

D.

Facial recognition

Full Access
Question # 42

A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run. Which of the following tools is the technician using?

A.

Process

B.

Services

C.

Startup

D.

Performance

Full Access
Question # 43

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Full Access
Question # 44

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Full Access
Question # 45

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Full Access
Question # 46

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Full Access
Question # 47

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Full Access