Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

    Copy the program file to a USB drive and install.

A.

Burn the program file to a CD and install.

B.

Format the HDD and then do the installation.

C.

Replace the HDD and then do the installation.

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

A.

Network & Internet

B.

System

C.

Personalization

D.

Accounts

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

D.

Run an antivirus and enable encryption.

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.

VNC

B.

RMM

C.

RDP

D.

SSH

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

A.

1

B.

53

C.

110

D.

445

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

A.

End user training

B.

Progress notes

C.

Knowledge base

D.

Acceptable use policy document

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

A.

APFS

B.

FAT32

C.

NTFS

D.

ext4